You want to perform an active session hijack against Secure Inc. You have found a target that allows Telnet session. You have also searched an active session due to the high level of traffic on the network. What should you do next?
Hmm, I'm not totally sure about this one. I guess it could be making sure the data collected is accurate, but I'm not 100% confident on that. I'll have to think it through a bit more.
Hmm, this is a tricky one. I'm not totally sure about the differences between the options, but I think implementing microsegmentation or using VLANs could be good ways to isolate the infected systems and prevent the malware from spreading.
This is a good question to test our understanding of business architecture. I believe the key benefit is enabling the organization to be more agile and responsive to changing business needs, so I'll go with D.
upvoted 0 times
...
Log in to Pass4Success
Sign in:
Report Comment
Is the comment made by USERNAME spam or abusive?
Commenting
In order to participate in the comments you need to be logged-in.
You can sign-up or
login
Franchesca
4 months agoYoulanda
4 months agoTresa
4 months agoZana
4 months agoMoira
5 months agoWilliam
5 months agoEliz
5 months agoHerschel
5 months agoJanna
5 months agoMinna
5 months agoShenika
5 months agoOctavio
5 months agoPamella
5 months ago