Question: 7 2 . 7 % complete Question In a cybersecurity operation where minimizing downtime is critical to its mission, a cybersecurity analyst incorporates allowlists and
complete
Question
In a cybersecurity operation where minimizing downtime is critical to its mission, a cybersecurity analyst incorporates allowlists and denylists restrictions. The objective is to guarantee high availability HA and safeguard against potential security threats. How would a cybersecurity analyst utilize these lists in this scenario? Select the two best options.
AAllowlists can specify approved software, hardware, and change types that are essential for the operation's functioning.
BDenylists can restrict changes that require rigorous testing and approval to prevent any potential disruptions to the operation.
CAllowlists can include authorized software and hardware updates that are preapproved for installation to ensure operational continuity.
DDenylists can block unauthorized software, hardware, and change types that pose high risk to the operation's availability and security.
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
