What are two advantages of security orchestration, automation, and response (SOAR)? (Choose two.)
Which type of attack includes exfiltration of data as a primary objective?
Which MITRE ATT&CK tactic grants increased permissions to a user account for internal servers of a corporate network?