Okay, I think I've got this. Port signatures are designed to watch for attempts to connect to well-known, frequently attacked ports, so that's got to be the right answer. I feel good about selecting option A.
Hmm, I'm not totally sure about this one. The question is a bit vague, and I'm not 100% confident in my understanding of the different ITSM practices. I'll have to think it through carefully.
upvoted 0 times
...
Log in to Pass4Success
Sign in:
Report Comment
Is the comment made by USERNAME spam or abusive?
Commenting
In order to participate in the comments you need to be logged-in.
You can sign-up or
login
Ilda
5 months agoLettie
5 months agoTwana
5 months agoWhitney
5 months agoNoel
5 months agoLavonda
5 months agoWinifred
5 months agoAudria
5 months agoDannette
5 months agoSimona
6 months agoGilbert
6 months ago