The CISO wants to implement a Security Operations Center (SOC) to improve and coordinate the detection of unauthorized access to the enterprise. The CISO's biggest concern is the increased number of attacks that the current infrastructure cannot detect. Which of the following would NOT be a part of the solution in the SOC to address his specific concerns?
A. DLP
B. white box testing
C. NIPS
D. forensics
B
Explanation: White box testing is used to access the vulnerabilities of an application and would not contribute to addressing his biggest concern, which is the increased number of attacks that the current infrastructure cannot detect.
You might also like to view...
PHP indexes start at ________ by default.
a. 1 b. 0 c. null d. -1
In a ____ storage device, records can be accessed in any order.
A. null-access B. reverse-access C. linear-access D. random-access
A cluster of computers tied together to share files and communications is a(n) ____________________.
Fill in the blank(s) with the appropriate word(s).
A(n) _____ macro allows you to embed macro capabilities directly in a table to add, change, or delete data based on conditions you specify.
Fill in the blank(s) with the appropriate word(s).