Summary

This document contains two security questions and answers related to identifying attacker activities and exploiting vulnerabilities in older browser versions.

Full Transcript

Question #1: Which of the following can be used to identify potential attacker activities without affecting production servers? A.Honey pot (answer) B.Video surveillance C.Zero Trust D.Geofencing Question #2: An enterprise has been experiencing attacks focused on exploiting vulnerabilities in older...

Question #1: Which of the following can be used to identify potential attacker activities without affecting production servers? A.Honey pot (answer) B.Video surveillance C.Zero Trust D.Geofencing Question #2: An enterprise has been experiencing attacks focused on exploiting vulnerabilities in older browser versions with well-known exploits. Which of the following security solutions should be configured to best provide the ability to monitor and block these known signature-based attacks? A.ACL B.DLP C.IDS D.IPS (answer)

Use Quizgecko on...
Browser
Browser