Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

in a cybersecurity operation where minimizing downtime is critical to its mission, a cybersecurity analyst incorporates allowlists and denylists restrictions. The objective is to guarantee

in a cybersecurity operation where minimizing downtime is critical to its mission, a cybersecurity analyst incorporates allowlists and denylists restrictions. The objective is to guarantee high availability (HA) and safeguard against potential security threats. How would a cybersecurity analyst utilize these lists in this scenario? (Select the two best options.)
A.Allowlists can specify approved software, hardware, and change types that are essential for the operation's functioning.
B.Denylists can restrict changes that require rigorous testing and approval to prevent any potential disruptions to the operation.
C.Allowlists can include authorized software and hardware updates that are preapproved for installation to ensure operational continuity.
D.Denylists can block unauthorized software, hardware, and change types that pose high risk to the operation's availability and security.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Data And Databases

Authors: Jeff Mapua

1st Edition

1978502257, 978-1978502253

More Books

Students also viewed these Databases questions