Multiple Choice
The Chief Information Security Officer (CISO) for an organization wants to develop custom IDS rulesets faster, prior to new rules being released by IDS vendors. Which of the following BEST meets this objective?
A) Identify a third-party source for IDS rules and change the configuration on the applicable IDSs to pull in the new rulesets
B) Encourage cybersecurity analysts to review open-source intelligence products and threat database to generate new IDS rules based on those sources
C) Leverage the latest TCP- and UDP-related RFCs to arm sensors and IDSs with appropriate heuristics for anomaly detection
D) Use annual hacking conventions to document the latest attacks and threats, and then develop IDS rules to counter those threats
Correct Answer:

Verified
Correct Answer:
Verified
Q67: Designing a system in which only information
Q68: Which of the following attacks can be
Q69: When reviewing KRIs of the email security
Q70: A security consultant was hired to audit
Q71: Following a recent and very large corporate
Q73: An internal staff member logs into an
Q74: A company has adopted and established a
Q75: A security consultant is attempting to discover
Q76: A recent CRM upgrade at a branch
Q77: To meet a SLA, which of the