Question 36
What is a difference between SOAR and SIEM?
Question 37
What is the impact of encryption?
Question 38
Which two elements of the incident response process are stated in NIST Special Publication 800-61 r2?
(Choose two.)
Question 39
When trying to evade IDS/IPS devices, which mechanism allows the user to make the data incomprehensible without a specific key, certificate, or password?
Question 40
How does agentless monitoring differ from agent-based monitoring?
