Which of the following BEST describes the offensive participants in a tabletop exercise?
A. Red team
B. Blue team
C. System administrators
D. Security analysts
E. Operations team
After analyzing and correlating activity from multiple sensors, the security analyst has
determined a group from a high-risk country is responsible for a sophisticated breach of the
company network and continuous administration of targeted attacks for the past three months.
Until now, the attacks went unnoticed. This is an example of:
A. privilege escalation.
B. advanced persistent threat.
C. malicious insider threat.
D. spear phishing.
External users are reporting that a web application is slow and frequently times out when
attempting to submit information. Which of the following software development best practices
would have helped prevent this issue?
A. Stress testing
B. Regression testing
C. Input validation
A vulnerability scan has returned the following information: