An analyst is reviewing a vulnerability report and must make recommendations to the executive team. The analyst finds that most systems can be upgraded with a reboot resulting in a single downtime window. However, two of the critical systems cannot be upgraded due to a vendor appliance that the company does not have access to. Which of the following inhibitors to remediation do these systems and associated vulnerabilities best represent?
Intrusion Detection Systems (IDS) logs provide visibility into network traffic patterns and can help detect insecure or unusual connections. These logs will show if non-secure protocols are used, potentially revealing exposed credentials. According to CompTIA CySA+, IDS logs are essential for identifying malicious activity related to communications and network intrusions. Options like DNS (A) and tcpdump (B) provide network details, but IDS specifically monitors for intrusions and unusual activities relevant to security incidents.
Sarah
3 months agoClay
3 months agoMarshall
3 months agoKanisha
4 months agoMarvel
4 months agoGerman
4 months agoParis
4 months agoClay
4 months agoTrinidad
5 months agoKimbery
5 months agoAnissa
5 months agoTamar
5 months agoTruman
5 months agoTequila
5 months agoAlease
9 months agoViva
8 months agoQueen
8 months agoNatalya
8 months agoGerman
9 months agoRosina
9 months agoMatthew
9 months agoAudria
9 months agoKiley
9 months agoDannette
9 months agoChara
10 months agoLorrie
8 months agoGilma
9 months agoChrista
9 months agoHerminia
10 months agoMerrilee
10 months agoLindsey
10 months agoJamal
10 months agoKeith
11 months agoDarnell
11 months agoKeith
11 months ago