Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

7 2 . 7 % complete Question In a cybersecurity operation where minimizing downtime is critical to its mission, a cybersecurity analyst incorporates allowlists and

72.7% complete
Question
In a cybersecurity operation where minimizing downtime is critical to its mission, a cybersecurity analyst incorporates allowlists and denylists restrictions. The objective is to guarantee high availability (HA) and safeguard against potential security threats. How would a cybersecurity analyst utilize these lists in this scenario? (Select the two best options.)
A.Allowlists can specify approved software, hardware, and change types that are essential for the operation's functioning.
B.Denylists can restrict changes that require rigorous testing and approval to prevent any potential disruptions to the operation.
C.Allowlists can include authorized software and hardware updates that are preapproved for installation to ensure operational continuity.
D.Denylists can block unauthorized software, hardware, and change types that pose high risk to the operation's availability and security.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

MongoDB Applied Design Patterns Practical Use Cases With The Leading NoSQL Database

Authors: Rick Copeland

1st Edition

1449340040, 978-1449340049

More Books

Students also viewed these Databases questions

Question

Describe payroll fraud and give examples [5] [Total:25 marks]

Answered: 1 week ago