Which of the following is the BEST method for mitigating the threat?
A system administrator identifies unusual network traffic from outside the local network.
Which of the following is the BEST method for mitigating the threat?
A . Malware scanning
B . Port blocking
C . Packet capturing
D . Content filtering
Answer: C
Latest CFR-310 Dumps Valid Version with 100 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Subscribe
Login
0 Comments
Inline Feedbacks
View all comments