Which of the following tools should be implemented to detect similar attacks?

A security incident responder discovers an attacker has gained access to a network and has overwritten key system files with backdoor software. The server was reimaged and patched offline.

Which of the following tools should be implemented to detect similar attacks?
A . Vulnerability scanner
B . TPM
C . Host-based firewall
D . File integrity monitor
E . NIPS

Answer: C,D

Latest CAS-003 Dumps Valid Version with 509 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments