Which of the following represents how the HIPS should have been configured to prevent the intrusion, while also creating an alert?

Posted by: Pdfprep Category: SK0-004 Tags: , ,

A security breach occurred in a datacenter. An analysis of the HIPS log files on a sever reveals an intrusion was logged, but no action was taken to prevent the intrusion.

Which of the following represents how the HIPS should have been configured to prevent the intrusion, while also creating an alert?
A . Block
B . Warn
C . Allow
D . Log

Answer: A

Leave a Reply

Your email address will not be published.