Question 21

Select the appropriate attack and remediation from each drop-down list to label the corresponding attack with its remediation.
INSTRUCTIONS
Not all attacks and remediation actions will be used.
If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Question 22

A security analyst needs to be proactive in understand the types of attacks that could potentially target the company's execute. Which of the following intelligence sources should to security analyst review?
  • Question 23

    A company recently added a DR site and is redesigning the network. Users at the DR site are having issues browsing websites.
    INSTRUCTIONS
    Click on each firewall to do the following:
    * Deny cleartext web traffic.
    * Ensure secure management protocols are used.
    * Resolve issues at the DR site.
    The ruleset order cannot be modified due to outside constraints.
    If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.



    Question 24

    Which of the following should be put in place when negotiating with a new vendor about the timeliness of the response to a significant outage or incident?
  • Question 25

    A172
    given to areas that are currently experiencing latency and connection issues. Which of the following would be the BEST resource for determining the order of priority?