Question 1
What is the cause when alerts generated by a correlation rule are not creating an incident?
Question 2
A ransomware alert triggers a playbook. What automated responses would be suitable?
Response:
Question 3
Which type of analytics will trigger the alert on the image shown?
Question 4
Match the alert type to its primary detection method:
Alert Type
A) IOC
B) BIOC
C) Correlation
D) XDR Agent
Detection Method
1. Known bad indicator match
2. Behavioral anomalies in endpoint logs
3. Multi-source activity correlation
4. Native agent telemetry generation
Response:
Question 5
Matching - ASM Use Case to Feature
Use Case
A) Identify exposed CVEs
B) Review vulnerable asset details
C) Investigate active threat paths
D) Monitor evolving service risks
Feature
1. Attack surface rules
2. Asset inventory
3. Threat response center
4. Continuous ASM scans
Response: