Which of the follow...
 
Notifications
Clear all

Which of the following should be used in place of these devices to prevent future attacks?

1 Posts
1 Users
0 Likes
171 Views
(@schultzachariah)
Noble Member
Joined: 2 years ago
Posts: 745
Topic starter  

An IDS was installed behind the edge firewall after a network was breached. The network was then breached again even though the IDS logged the attack .

Which of the following should be used in place of these devices to prevent future attacks?

  • A . A network tap
  • B . A proxy server
  • C . A UTM appliance
  • D . A content filter

Show Answer Hide Answer

Suggested Answer: C

   
Quote

Latest CompTIA N10-007 Dumps Valid Version

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Share: