Top 100+ questions in Technology

0 votes
    Who developed hunting maturity model? A. David Bianco, a infocyte’s security technologist B. David Bianco, ... D. David Bianco, a Vectra’s security technologist...
asked Feb 27, 2023 in Technology by JackTerrance
0 votes
    Which of the following is a stage in Cyber Kill Chain? A. Reconnaissance B. Actions on Objectives C. Installation D. Delivery E. All the Options...
asked Feb 27, 2023 in Technology by JackTerrance
0 votes
    Cognizant Bulk Hiring Freshers and Experienced 2023| CTC 5 to 15 LPA | Apply Now...
asked Feb 27, 2023 in Technology by Editorial Staff
0 votes
    _____________ is used for identification and prevention of cyber intrusions. A. Hunting maturity model B. Cyber kill chain C. Hunting loop D. Hunting Matrix...
asked Feb 26, 2023 in Technology by JackTerrance
0 votes
    Which of the following is the cyber threat intelligence model that have been widely used in the industry? A. The Diamond Model ... Chain C. None of the options D. Both the options...
asked Feb 26, 2023 in Technology by JackTerrance
0 votes
    Which threat hunting platform was acquired by Amazon Web Services? A. Maltego B. Exabeam C. Vectra D. Sqrrl...
asked Feb 26, 2023 in Technology by JackTerrance
0 votes
    Which of the following are threat hunting techniques? A. Stack counting B. Clustering C. Grouping D. All the Options...
asked Feb 26, 2023 in Technology by JackTerrance
0 votes
    Which of the following are threat hunting platforms? A. Sqrrl B. Infocyte C. Endgame Inc D. Vectra E. All the Options...
asked Feb 26, 2023 in Technology by JackTerrance
0 votes
    Approximate amount spent on security detection and defense technologies to identify and stop advanced threats is _______. A. $850000 B. $750000 C. $650000 D. $550000...
asked Feb 26, 2023 in Technology by JackTerrance
0 votes
    Threat hunters use __________. A. Automated tools B. Manual methods C. Both the options D. None of the options...
asked Feb 26, 2023 in Technology by JackTerrance
0 votes
    Threat hunters will be able to offer a high degree of protection only if there is a _____________. A. Moderate level of ... . Low level of visibility into networks D. None of these...
asked Feb 26, 2023 in Technology by JackTerrance
0 votes
    How often are process audits carried out? A. Monthly B. With major releases B. Quarterly...
asked Feb 26, 2023 in Technology by JackTerrance
0 votes
    Software that is secure on a given platform, environment, and threat landscape can be considered secure in any other platform, environment or threat landscape. A. True B. False...
asked Feb 26, 2023 in Technology by JackTerrance
0 votes
    What is the output of Governance Review? A. Vulnerability report B. SSA Maturity report C. Top strategic improvements D. Report with SWOT analysis...
asked Feb 25, 2023 in Technology by JackTerrance
0 votes
    What is the output of Technical Review? A. Report with SWOT analysis B. SSA Maturity report C. Top strategic improvements D. Vulnerability report...
asked Feb 25, 2023 in Technology by JackTerrance
0 votes
    Which of the following SSA audit types involves simulating real-life attacker in the unprivileged and privileged modes? ... Audits B. Process Maturity Review C. Technical Review...
asked Feb 25, 2023 in Technology by JackTerrance
0 votes
    Which of the following approaches are adopted during Governance Review? A. Question and Answer B. Data Analysis C. Subjective Judgement D. All of these...
asked Feb 25, 2023 in Technology by JackTerrance
0 votes
    How often are Process Maturity Reviews conducted? A. With major releases B. Half Yearly...
asked Feb 25, 2023 in Technology by JackTerrance
0 votes
    The safeguards that are integrated throughout the delivery lifecycle by SSA, making solutions and services ... Privacy, Reliability D. Confidentiality, Integrity, Availability...
asked Feb 25, 2023 in Technology by JackTerrance
0 votes
    Which of the following is an intensive review performed to confirm compliance with the customer’s security, privacy ... Maturity Review B. Process Audits C. Technical Review...
asked Feb 25, 2023 in Technology by JackTerrance
0 votes
    Which of the following properties aim to generate a trail to identify the source and path of attack? A. Repudiation B. Resilience C. Traceability D. Accountability...
asked Feb 25, 2023 in Technology by JackTerrance
0 votes
    Which of the following is a highly data-oriented review that provides independent inputs on SSA strategies? A. Process ... . Technical Review C. Process Audits D. Governance Review...
asked Feb 25, 2023 in Technology by JackTerrance
0 votes
    Which of the following approaches generates a report with SWOT analysis? A. Technical Review B. Process Audit C. Process Maturity Review...
asked Feb 25, 2023 in Technology by JackTerrance
0 votes
    A Flow Library contains a set of ______ used for common tasks like notarizing a transaction, gathering required signatures, etc. A. Flows B. Contracts C. Transactions D. Cordapps...
asked Feb 23, 2023 in Technology by JackTerrance
0 votes
    ___________ is the core business logic on which CorDapps run. A. Transaction B. Contract C. Legal prose D. Flow framework...
asked Feb 23, 2023 in Technology by JackTerrance
0 votes
    Communication between nodes occur in the context of flows, and is point to point. A. True B. False...
asked Feb 23, 2023 in Technology by JackTerrance
0 votes
    ________ are a set of rules that determine the execution of a transaction. A. Program B. Instruction C. Tables D. Contracts...
asked Feb 23, 2023 in Technology by JackTerrance
0 votes
    _______ include data shared between two more or more nodes in a network. A. Data B. Messages C. Shared fact D. Contracts...
asked Feb 23, 2023 in Technology by JackTerrance
0 votes
    __________ is a distributed ledger technology where data is stored in the form of blocks. A. Blockchain B. Database C. Cryptocurrency D. Contracts...
asked Feb 23, 2023 in Technology by JackTerrance
0 votes
    R3 Corda is a private, permissioned blockchain. A. True B. False...
asked Feb 23, 2023 in Technology by JackTerrance
...