PdfPrep.com

Which of the following represents how the HIPS should have been configured to prevent the intrusion, while also creating an alert?

A security breach occurred in a datacenter. An analysis of the HIPS log files on a sever reveals an intrusion was logged, but no action was taken to prevent the intrusion.

Which of the following represents how the HIPS should have been configured to prevent the intrusion, while also creating an alert?
A . Block
B . Warn
C . Allow
D . Log

Answer: A

Exit mobile version