I think intrusion techniques used by attackers might be one of the options too. We practiced a similar question in class about identifying methods used in breaches.
Ah, I see what they're getting at here. Duplicate entries could happen if two different applications are referencing the same installation files or using the same applicability or detection rules. I feel pretty confident about this one.
Hmm, this question seems a bit tricky. I'll need to carefully read through the options and think about how the "Create Rule" button in the Security Events tab would work.
I remember practicing questions about SQL subsets, and Data Definition Language seemed more about creating and altering structures, not access control.
upvoted 0 times
...
Log in to Pass4Success
Sign in:
Report Comment
Is the comment made by USERNAME spam or abusive?
Commenting
In order to participate in the comments you need to be logged-in.
You can sign-up or
login
Blossom
5 months agoCarlee
6 months agoAntonio
6 months agoDelsie
6 months agoAnnelle
6 months agoLynna
6 months agoRebbecca
6 months agoLaine
6 months agoTegan
6 months agoAugustine
6 months agoMaryrose
6 months agoJeanice
6 months agoJordan
6 months ago