正解:C
Attack simulationsproviderealistic, hands-on scenariosthat mirror true incidents, allowing SOC analysts to practice detection, analysis, and response skillsunder real-world pressure. These simulations are crucial for developing and reinforcing SOC procedures and incident workflows.
* Phishing assessments (A)are targeted, limited training.
* OpenVAS (B)is a vulnerability scanner, not a training tool.
* SOAR (D)is a response automation tool.
* Honeypots (E)help observe attacker behavior, but aren't training-focused.
#Reference:
* CS0-003 Objectives 3.3 - Incident Response Training
* Mya Heath All-in-One - Chapter 14: Post-Incident Activities and Training