1.
Why is it important for an Incident Responder to analyze an incident during the Recovery phase?
2.
How does an attacker use a zero-day vulnerability during the Incursion phase?
3.
Why is it important for an Incident Responder to review Related Incidents and Events when analyzing an incident for an After Actions Report?
4.
What is the role of Cynic within the Advanced Threat Protection (ATP) solution?
5.
Which section of the ATP console should an ATP Administrator use to create blacklists and whitelists?