Question 51
Which of the following characteristics of a web proxy strengthens cybersecurity? (Choose two.)
Question 52
A security operations center (SOC) analyst observed an unusually high number of login failures on a particular database server. The analyst wants to gather supporting evidence before escalating the observation to management. Which of the following expressions will provide login failure data for 11/24/2015?
Question 53
If a hacker is attempting to alter or delete system audit logs, in which of the following attack phases is the hacker involved?