Which of the following is the BEST method for mitigating the threat?

Posted by: Pdfprep Category: CFR-310 Tags: , ,

A system administrator identifies unusual network traffic from outside the local network.

Which of the following is the BEST method for mitigating the threat?
A . Malware scanning
B . Port blocking
C . Packet capturing
D . Content filtering

Answer: C

Leave a Reply

Your email address will not be published.