An administrator wants to block Java exploits that were not detected by the organization's antivirus product. Which of the following mitigation methods should an incident responder perform? (Choose two.)
I'm going to have to go with C and E. A custom IPS signature and blocking the port on the firewall? That's the security equivalent of a one-two punch. Java exploits, meet your match!
A and E, baby! DNS filtering and blocking the port on the firewall? That's the security dream team right there. Java exploits don't stand a chance against our dynamic duo!
D and E for me. Implementing an ACL and blocking the port on the firewall - that's how we keep those Java exploits at bay. Gotta love a good ol' fashioned firewall ruleset, am I right?
I'm going with B and C. Sending the binary to the AV vendor for analysis and creating a custom IPS signature are the way to go. Can't beat a good old-fashioned security investigation!
Micaela
2 months agoLaura
1 months agoEna
1 months agoJoanna
1 months agoDoyle
1 months agoGilma
2 months agoTarra
2 months agoMalika
2 months agoLashawna
2 months agoBrandon
2 months agoJanna
3 months agoGeraldo
3 months agoCarlee
3 months agoWayne
3 months agoCharlena
2 months agoJose
3 months agoSherita
3 months agoMindy
4 months agoGlory
3 months agoGlory
3 months ago