Chapter 7 PDF
Document Details
![PalatialMarigold](https://quizgecko.com/images/avatars/avatar-20.webp)
Uploaded by PalatialMarigold
Tags
Summary
This document contains two security questions and answers related to identifying attacker activities and exploiting vulnerabilities in older browser versions.
Full Transcript
Question #1: Which of the following can be used to identify potential attacker activities without affecting production servers? A.Honey pot (answer) B.Video surveillance C.Zero Trust D.Geofencing Question #2: An enterprise has been experiencing attacks focused on exploiting vulnerabilities in older...
Question #1: Which of the following can be used to identify potential attacker activities without affecting production servers? A.Honey pot (answer) B.Video surveillance C.Zero Trust D.Geofencing Question #2: An enterprise has been experiencing attacks focused on exploiting vulnerabilities in older browser versions with well-known exploits. Which of the following security solutions should be configured to best provide the ability to monitor and block these known signature-based attacks? A.ACL B.DLP C.IDS D.IPS (answer)