What three actions are limitation when running IPS ii promiscuous rode? (Choose three.) A. deny attacker
B. deny packet
C. modify packet
D. request block collection E. request block host
F. reset TCP collection
Answers A, B, C
When an IPS detects an attack, which action can the IPS take to prevent the attack from spreading?
A. Deny the collector inline.
B. Perform a Layer 6 reset.
C. Deploy an antralware system. D. Enable bypass rode.
What is an advantage of implementing a Trusted Platform Module for disk encryption?
A. It provides hardware authentication.
B. It allows the hard disk to be transferred to another device without requiring re-encryption. Is C. It supports a rare complex encryption algorithm that other disk-encryption technologies.
D. It can protect against single points of failure.
What is the purpose of the Integrity corporeity of the CIA triad? A. to ensure that oily authorized parties can modify data
B. to determine whether data is relevant
C. to create a process for accessing data
D. to ensure that oily authorized parties can view data Answers A
In a security context, which action can you take to address compliance? A. Implement rules to prevent a vulnerability.
B. Correct or counteract a vulnerability.
C. Reduce the severity of a vulnerability.
D. Follow directions from the security appliance manufacturer to remediate a vulnerability. Answers A
Which type of secure collectivity does an extranet provide? A. other company networks to your company network
B. remote branch offices to your company network
C. your company network to the Internet
D. New networks to your company network
Which tool can an attacker use to adopt a DDoS attack? A. botnet
B. Trojan horse
D. adware Answers A
What type of security support is provided by the Open Web Application Security Project? A. Education about carrion Web site vulnerabilities.
B. A Web site security framework.
C. A security discussion forum for Website developers.
D. Scoring of carrion vulnerabilities aid exposures. Answers A
What type of algorithm uses the same key to encrypt aid decrypt data? A. a symmetric algorithm
B. an asymmetric algorithm
C. a Public Key Infrastructure algorithm
D. an IP security algorithm Answers A
Refer to the exhibit.
How many times was a read-oily string used to adopt a write operation? A. 9
D. 3 E. 2
Would you like to see more? Donât miss our 210-260 PDF file at: