Which of the following is an asymmetric encryption algorithm?
Correct Answer:
D
https://www.omnisecu.com/security/public-key-infrastructure/asymmetric-encryption-algorithms.php
Which of the following acronyms covers the real-time analysis of security alerts generated by applications and network hardware?
Correct Answer:
B
https://en.wikipedia.org/wiki/Security_information_and_event_management
Which term describes a vulnerability that is unknown and therefore has no mitigating control which is immediately and generally available?
Correct Answer:
D
https://en.wikipedia.org/wiki/Zero-day_(computing)
What term is used to describe the testing of a continuity plan through a written scenario being used as the basis for discussion and simulation?
Correct Answer:
E
One traditional use of a SIEM appliance is to monitor for exceptions received via syslog. What system from the following does NOT natively support syslog events?
Correct Answer:
C