312-39 Exam Question 16
According to the Risk Matrix table, what will be the risk level when the probability of an attack is very high, and the impact of that attack is major?
NOTE: It is mandatory to answer the question before proceeding to the next one.
NOTE: It is mandatory to answer the question before proceeding to the next one.
312-39 Exam Question 17
Which of the following technique protects from flooding attacks originated from the valid prefixes (IP addresses) so that they can be traced to its true source?
312-39 Exam Question 18
Harley is working as a SOC analyst with Powell Tech. Powell Inc. is using Internet Information Service (IIS) version 7.0 to host their website.
Where will Harley find the web server logs, if he wants to investigate them for any anomalies?
Where will Harley find the web server logs, if he wants to investigate them for any anomalies?
312-39 Exam Question 19
Which of the following Windows Event Id will help you monitors file sharing across the network?
312-39 Exam Question 20
What does Windows event ID 4740 indicate?
