An administrator wants to block Java exploits that were not detected by the organization's antivirus product. Which of the following mitigation methods should an incident responder perform? (Choose two.)
I'm going to have to go with C and E. A custom IPS signature and blocking the port on the firewall? That's the security equivalent of a one-two punch. Java exploits, meet your match!
A and E, baby! DNS filtering and blocking the port on the firewall? That's the security dream team right there. Java exploits don't stand a chance against our dynamic duo!
D and E for me. Implementing an ACL and blocking the port on the firewall - that's how we keep those Java exploits at bay. Gotta love a good ol' fashioned firewall ruleset, am I right?
I'm going with B and C. Sending the binary to the AV vendor for analysis and creating a custom IPS signature are the way to go. Can't beat a good old-fashioned security investigation!
Micaela
10 months agoLaura
9 months agoEna
9 months agoJoanna
9 months agoDoyle
9 months agoGilma
9 months agoTarra
10 months agoMalika
9 months agoLashawna
10 months agoBrandon
10 months agoJanna
10 months agoGeraldo
10 months agoCarlee
11 months agoWayne
11 months agoCharlena
10 months agoJose
10 months agoSherita
11 months agoMindy
11 months agoGlory
10 months agoGlory
11 months ago