Chapter 7 PDF
Document Details
Uploaded by PalatialMarigold
Tags
Summary
This document contains two security questions and answers related to identifying attacker activities and exploiting vulnerabilities in older browser versions.
Full Transcript
Question #1: Which of the following can be used to identify potential attacker activities without affecting production servers? A.Honey pot (answer) B.Video surveillance C.Zero Trust D.Geofencing Question #2: An enterprise has been experiencing attacks focused on exploiting vulnerabilities in older...
Question #1: Which of the following can be used to identify potential attacker activities without affecting production servers? A.Honey pot (answer) B.Video surveillance C.Zero Trust D.Geofencing Question #2: An enterprise has been experiencing attacks focused on exploiting vulnerabilities in older browser versions with well-known exploits. Which of the following security solutions should be configured to best provide the ability to monitor and block these known signature-based attacks? A.ACL B.DLP C.IDS D.IPS (answer)