The Chief Information Security Officer (CISO) for an organization wants to develop custom IDS rulesets faster, prior to new rules being released by IDS vendors .
Which of the following BEST meets this objective?
A . Identify a third-party source for IDS rules and change the configuration on the applicable IDSs to pull in the new rulesets
B . Encourage cybersecurity analysts to review open-source intelligence products and threat database to generate new IDS rules based on those sources
C . Leverage the latest TCP- and UDP-related RFCs to arm sensors and IDSs with appropriate heuristics for anomaly detection
D . Use annual hacking conventions to document the latest attacks and threats, and then develop IDS rules to counter those threats
Answer: B
Latest CAS-003 Dumps Valid Version with 509 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund