Question 51

Which of the following characteristics of a web proxy strengthens cybersecurity? (Choose two.)
  • Question 52

    A security operations center (SOC) analyst observed an unusually high number of login failures on a particular database server. The analyst wants to gather supporting evidence before escalating the observation to management. Which of the following expressions will provide login failure data for 11/24/2015?
  • Question 53

    If a hacker is attempting to alter or delete system audit logs, in which of the following attack phases is the hacker involved?