Exam4Training

Which of the following Protection Modules make use of Recommendation scans?

Recommendation scans can detect applications and/or vulnerabilities on servers on the network.

Which of the following Protection Modules make use of Recommendation scans?
A . Firewall, Application Control, and Integrity Monitoring
B. Intrusion Prevention, Firewall, Integrity Monitoring and Log Inspection
C. Log Inspection, Application Control, and Intrusion Prevention
D. Intrusion Prevention, Integrity Monitoring, and Log Inspection

Answer: D

Explanation:

Recommendation Scans can suggest rules for the following Protection Modules:

• Intrusion Prevention

• Integrity Monitoring

• Log Inspection

Explication: Study Guide – page (161)

Exit mobile version