Okay, I think I've got this. Based on the information provided, a full system backup would be done during the eradication stage, to preserve evidence and ensure the system can be restored if needed. I'm feeling confident about this answer.
I'm not sure I fully understand the concept of GEM PORTS and how they relate to user traffic flows. I'll need to do some quick research on that before I attempt to answer this.
This seems like a good opportunity to apply the concepts we've been learning about SAML. I'll use the process of elimination to narrow down the options.
upvoted 0 times
...
Log in to Pass4Success
Sign in:
Report Comment
Is the comment made by USERNAME spam or abusive?
Commenting
In order to participate in the comments you need to be logged-in.
You can sign-up or
login
Yvonne
4 months agoCherri
5 months agoTyra
5 months agoKallie
5 months agoNancey
5 months agoJosphine
5 months agoEmiko
5 months agoMicah
5 months agoLauran
5 months agoZack
5 months agoMarjory
5 months agoBeckie
5 months ago