Question 61
What is personally identifiable information that must be safeguarded from unauthorized access?
Question 62

Refer to the exhibit. Which type of log is displayed?
Question 63
An engineer receives a security alert that traffic with a known TOR exit node has occurred on the network. What is the impact of this traffic?
Question 64
An analyst is investigating an incident in a SOC environment. Which method is used to identify a session from a group of logs?
Question 65
Which attack method intercepts traffic on a switched network?