Examlex

Solved

Refer to the Exhibit

question 79

Multiple Choice

  Refer to the exhibit. An engineer received a report that an attacker has compromised a workstation and gained access to sensitive customer data from the network using insecure protocols. Which action prevents this type of attack in the future? A)  Use VLANs to segregate zones and the firewall to allow only required services and secured protocols B)  Deploy a SOAR solution and correlate log alerts from customer zones C)  Deploy IDS within sensitive areas and continuously update signatures D)  Use syslog to gather data from multiple sources and detect intrusion logs for timely responses Refer to the exhibit. An engineer received a report that an attacker has compromised a workstation and gained access to sensitive customer data from the network using insecure protocols. Which action prevents this type of attack in the future?


Definitions:

Debug

The process of identifying and removing errors or bugs from software or hardware to ensure correct operation and functionality.

Visible Property

A setting in software development that controls whether an element or control is displayed to the user.

Program Flow

Refers to the order in which individual statements, instructions, or function calls of an imperative or a structured program are executed or evaluated.

Action Catalog

A collection or listing of actions or commands that can be utilized within an application or software environment.

Related Questions