I think intrusion techniques used by attackers might be one of the options too. We practiced a similar question in class about identifying methods used in breaches.
Ah, I see what they're getting at here. Duplicate entries could happen if two different applications are referencing the same installation files or using the same applicability or detection rules. I feel pretty confident about this one.
Hmm, this question seems a bit tricky. I'll need to carefully read through the options and think about how the "Create Rule" button in the Security Events tab would work.
I remember practicing questions about SQL subsets, and Data Definition Language seemed more about creating and altering structures, not access control.
upvoted 0 times
...
Log in to Pass4Success
Sign in:
Report Comment
Is the comment made by USERNAME spam or abusive?
Commenting
In order to participate in the comments you need to be logged-in.
You can sign-up or
login
Blossom
4 months agoCarlee
4 months agoAntonio
4 months agoDelsie
4 months agoAnnelle
5 months agoLynna
5 months agoRebbecca
5 months agoLaine
5 months agoTegan
5 months agoAugustine
5 months agoMaryrose
5 months agoJeanice
5 months agoJordan
5 months ago