Which utility blocks a host portscan?
Correct Answer:C
Which two elements of the incident response process are stated in NIST Special Publication 800-61 r2? (Choose two.)
Correct Answer:AB
Which signature impacts network traffic by causing legitimate traffic to be blocked?
Correct Answer:D
What is the practice of giving an employee access to only the resources needed to accomplish their job?
Correct Answer:A
Which type of attack occurs when an attacker is successful in eavesdropping on a conversation between two IP phones?
Correct Answer:D