
Answer-first summary for fast verification
Answer: Adopt a comprehensive threat intelligence platform that aggregates data from open-source, commercial, and proprietary sources, enriched with contextual analysis, and ensures seamless integration across network, endpoint, and cloud environments to support real-time threat detection and response.
A comprehensive threat intelligence platform that leverages a wide range of sources and provides enriched context is essential for effective threat detection and response, especially in a regulated and global environment. This approach ensures compliance, scalability, and the ability to address threats across all organizational layers. Option A undermines effectiveness by limiting sources. Option B fails to address the need for comprehensive coverage. Option D overlooks the importance of collaboration in enhancing threat intelligence analysis and response.
Author: LeetQuiz Editorial Team
Ultimate access to all questions.
No comments yet.
Your organization is in the process of deploying a new threat intelligence platform to enhance its cybersecurity posture. As the Cybersecurity Architect, you are tasked with defining the security requirements for this platform. The organization operates in a highly regulated industry, requiring strict compliance with data protection standards, and has a global presence with a need for scalable solutions. Considering these constraints, which of the following measures should you prioritize to ensure the threat intelligence platform is both effective and compliant? (Choose one option)
A
Limit the threat intelligence sources to only open-source feeds to minimize costs, despite the potential reduction in threat coverage and context.
B
Deploy the threat intelligence platform exclusively for network security, overlooking the integration with endpoint detection and cloud security tools, to simplify implementation.
C
Adopt a comprehensive threat intelligence platform that aggregates data from open-source, commercial, and proprietary sources, enriched with contextual analysis, and ensures seamless integration across network, endpoint, and cloud environments to support real-time threat detection and response.
D
Restrict access to the threat intelligence platform to a select group within the security team to reduce the risk of data leakage, ignoring the benefits of cross-departmental collaboration in threat analysis.