To mitigate the risk of intrusion, an IT Manager is concerned with using secure versions of protocols and services whenever possible. In addition, the security technician is required to monitor the types of traffic being generated. Which of the following tools is the technician MOST likely to use?
A. Port scanner
B. Network analyzer
C. IPS
D. Audit Logs
Answer: B SY0-401 Dumps
An administrator is implementing a new management system for the machinery on the company's production line. One requirement is that the system only be accessible while within the production facility. Which of the following will be the MOST effective solution in limiting access based on this requirement?
A. Access control list
B. Firewall policy
C. Air Gap
D. MAC filter
Answer: C
No comments:
Post a Comment
Note: only a member of this blog may post a comment.