DCOM 258 Final Exam Review | 140 Questions with 100% Correct Answers | Verified | Latest Update 2024
Which of the following techniques enables an already secure organization to assess security vulnerabilities in real time? - Continuous monitoring Which of the following can determine which flags are set in a TCP/IP handshake? - Protocol analyzer Which of following is the most basic form of IDS? - Signature-based You suspect a broadcast storm on the LAN. Which tool is required to diagnose which network adapter is causing the storm? - Protocol analyzer Which of the following log files should show attempts at unauthorized access? - Security Jason is a security administrator for a company of 4000 users. He wants to store 6 months of security logs to a logging server for analysis. The reports are required by upper management due to legal obligations but are not time-critical. When planning for the requirements of the logging server, which of the following should not be implemented? - Performance baseline and audit trails
Escuela, estudio y materia
- Institución
- DCOM 258
- Grado
- DCOM 258
Información del documento
- Subido en
- 10 de enero de 2024
- Número de páginas
- 15
- Escrito en
- 2023/2024
- Tipo
- Examen
- Contiene
- Preguntas y respuestas
Temas
-
dcom 258 final exam review 140 questions with 10