Question 51
Which two elements are used for profiling a network? (Choose two.)
Question 52
Which incidence response step includes identifying all hosts affected by an attack?
Question 53
A user received a malicious attachment but did not run it.
Which category classifies the intrusion?
Question 54
When communicating via TLS, the client initiates the handshake to the server and the server responds back with its certificate for identification.
Which information is available on the server certificate?
Question 55
What is a difference between inline traffic interrogation and traffic mirroring?
