Okay, I think I've got this. Port signatures are designed to watch for attempts to connect to well-known, frequently attacked ports, so that's got to be the right answer. I feel good about selecting option A.
Hmm, I'm not totally sure about this one. The question is a bit vague, and I'm not 100% confident in my understanding of the different ITSM practices. I'll have to think it through carefully.
upvoted 0
times
...
Log in to Pass4Success
Sign in:
Report Comment
Is the comment made by USERNAME spam or abusive?
Commenting
In order to participate in the comments you need to be logged-in.
You can sign-up or
login
Ilda
6 months agoLettie
6 months agoTwana
7 months agoWhitney
7 months agoNoel
7 months agoLavonda
7 months agoWinifred
7 months agoAudria
7 months agoDannette
7 months agoSimona
7 months agoGilbert
7 months ago