Question 226

A company has recently launched a new billing invoice website for a few key vendors.
The cybersecurity analyst is receiving calls that the website is performing slowly and the pages sometimes time out.
The analyst notices the website is receiving millions of requests, causing the service to become unavailable.
Which of the following can be implemented to maintain the availability of the website?
  • Question 227

    A cybersecurity analyst wants to use ICMP ECHO_REQUEST on a machine while using Nmap.
    Which of the following is the correct command to accomplish this?
  • Question 228

    For machine learning to be applied effectively toward security analysis automation, it requires __________.
  • Question 229

    While a threat intelligence analyst was researching an indicator of compromise on a search engine, the web proxy generated an alert regarding the same indicator.
    The threat intelligence analyst states that related sites were not visited but were searched for in a search engine.
    Which of the following MOST likely happened in this situation?
  • Question 230

    A company recently experienced multiple DNS DDoS attacks, and the information security analyst must provide a DDoS solution to deploy in the company's datacenter Which of the following would BEST prevent future attacks?