PrepAway - Latest Free Exam Questions & Answers

Author: admin

What would be the best course of action to follow?

A security analyst asks you to look at the traffic he has gathered, and you find several Push flags within the
capture. It seems the packets are sent to an unknown Internet Address (IP) that is not in your network from one
of your own IP addresses which is a financial database that is critical and must remain up and running 24×7.
This traffic was noticed in the middle of the day. What would be the best course of action to follow?


Page 47 of 277« First...102030...4546474849...607080...Last »