From the course: CCSP Cert Prep: 5 Cloud Security Operations Audio Review
Unlock the full course today
Join today to access over 22,500 courses taught by industry experts or purchase this course individually.
Threat assessment: Q&A
From the course: CCSP Cert Prep: 5 Cloud Security Operations Audio Review
Threat assessment: Q&A
- [Instructor] Here's a question that will test your knowledge of threat assessment. (door banging) You're concerned that an intruder might be active on your network and you'd like to monitor network traffic for signs of their activity. You want to use a passive tool to avoid tipping off the intruder to your presence. What tool would be the most appropriate for this task? Would you use a protocol analyzer? A vulnerability scanner? A honeypot? Or a honeynet? (air whooshing) Let me repeat that question for you. You're concerned that an intruder might be active on your network and you'd like to monitor network traffic for signs of their activity. You want to use a passive tool to avoid tipping off the intruder to your presence. What tool would be most appropriate for this task? Would you use a protocol analyzer? A vulnerability scanner? A honeypot or a honeynet? (air whooshing) (clock ticking) (bell…
Contents
-
-
-
Physical and logical infrastructure2m 54s
-
Physical and logical infrastructure: Q&A2m
-
Secure infrastructure operations2m 50s
-
Secure infrastructure operations: Q&A1m 18s
-
Network operations2m 36s
-
Network operations: Q&A1m 11s
-
Network security2m 28s
-
Network security: Q&A1m 51s
-
Security baselines and standards2m 32s
-
Security baselines and standards: Q&A1m 39s
-
Monitoring2m 11s
-
Monitoring: Q&A1m 37s
-
Threat assessment2m 10s
-
Threat assessment: Q&A1m 35s
-
Incident management1m 47s
-
Incident management: Q&A1m 23s
-
Investigations and forensics1m 51s
-
Investigations and forensics: Q&A1m 25s
-
-