A home automation company just purchased and installed tools for its SOC to enable incident identification and response on software the company develops. The company would like to prioritize defenses against the following attack scenarios:
✑ Unauthorized insertions into application development environments
✑ Authorized insiders making unauthorized changes to environment configurations
Which of the following actions will enable the data feeds needed to detect these types of attacks on development environments? (Choose two.)
nelombg
Highly Voted 1 year, 2 months agodeeden
Most Recent 5 months, 3 weeks agodeeden
5 months, 3 weeks agoBright07
6 months, 1 week agoIT_Master_Tech
6 months, 2 weeks ago23169fd
9 months, 4 weeks agoEAlonso
10 months agocyspec
10 months, 1 week agoToPH
11 months agora774ra7
1 year, 3 months agotalosDevbot
1 year, 3 months agoBiteSize
1 year, 9 months agokycugu
2 years, 4 months agoatebyasandwich
2 years, 4 months agodangerelchulo
2 years, 7 months agoAgrona
2 years, 8 months agoAlexJacobson
2 years, 9 months agoAlexJacobson
2 years, 9 months agoBiteSize
1 year, 9 months agoRevZig67
2 years, 11 months ago