A security analyst has discovered suspicious traffic and determined a host is connecting to a known malicious website. The MOST appropriate action for the analyst to take would be to implement a change request to:
A. update the antivirus software.
B. configure the firewall to block traffic to the domain.
C. add the domain to the blacklist.
D. create an IPS signature for the domain.
Answer: C. add the domain to the blacklist.
You might also like to view...
As applied within the EBK, a(n) ____________________ encompasses a given set of roles.
Fill in the blank(s) with the appropriate word(s).
Suppose we want to declare a pointer to a function which has a float return type, and two parameters: the first one an integer and the second one a string. We want to name the pointer fptr. The declaration would look like this:
A. float (fptr) (int, string); B. float (fptr) (int, string); C. float (fptr) (int, string); D. float ( int, string) fptr;
Answer the following statements true (T) or false (F)
1. To avoid destroying valid output data residing in a buffer, UNIX responds to a write command by marking the appropriate buffer dirty. 2. UNIX implements pipes by taking advantage of its file system. 3. Under UNIX, although physical I/O may appear asynchronous, it is really synchronous. 4. Linux differs substantially from UNIX and Windows. 5. All Linux device drivers are in the kernel.
The Trust Center is a tool for users to add ________ that the user knows are secure to minimize security breaches within an Access database
A) user names B) Web addresses C) locations D) network paths