A. Allow downloads to both managed and unmanaged devices.
B. Allow users to choose their own applications to access data.
C. Allow downloads to managed devices but block them from unmanaged devices.
D. Leave data security in the hands of the cloud service provider.
A. Open Shortest Path First (OSPF)
B. Routing Information Protocol (RIP)
C. Split horizon
D. Border Gateway Protocol (BGP)
A. It steals personal information.
B. It encrypts user data.
C. It cannot be detected by antivirus because of its masking techniques.
D. It takes control of the operating system.
A. C
B. D
C. A
D. B
A. It acts as a safety net during an attack while patches are developed.
B. It manages applications accessible on endpoints.
C. It secures internal network traffic against unknown threats.
D. It reduces the need for network security.
A. Leverage an EDR solution to request the logs from endpoints.
B. Connect to the endpoints remotely and download the logs.
C. Build a script that pulls down the logs from all endpoints.
D. Configure endpoints to forward logs to a SIEM.
A. Use of non-standard ports
B. Port hopping
C. Tunneling within commonly used services
D. Hiding within SSL encryption