DCOM 258 Final Exam Review | 140 Questions with 100% Correct Answers | Verified | Latest Update 2024
Which of the following techniques enables an already secure organization to assess security vulnerabilities in real time? - Continuous monitoring Which of the following can determine which flags are set in a TCP/IP handshake? - Protocol analyzer Which of following is the most basic form of IDS? - Signature-based You suspect a broadcast storm on the LAN. Which tool is required to diagnose which network adapter is causing the storm? - Protocol analyzer Which of the following log files should show attempts at unauthorized access? - Security Jason is a security administrator for a company of 4000 users. He wants to store 6 months of security logs to a logging server for analysis. The reports are required by upper management due to legal obligations but are not time-critical. When planning for the requirements of the logging server, which of the following should not be implemented? - Performance baseline and audit trails
Geschreven voor
- Instelling
- DCOM 258
- Vak
- DCOM 258
Documentinformatie
- Geüpload op
- 10 januari 2024
- Aantal pagina's
- 15
- Geschreven in
- 2023/2024
- Type
- Tentamen (uitwerkingen)
- Bevat
- Vragen en antwoorden
Onderwerpen
-
dcom 258 final exam review 140 questions with 10