Refer to the exhibit.
An engineer received a report that an attacker has compromised a workstation and gained access to sensitive customer data from the network using insecure protocols .
Which action prevents this type of attack in the future?
A . Use VLANs to segregate zones and the firewall to allow only required services and secured protocols
B . Deploy a SOAR solution and correlate log alerts from customer zones
C . Deploy IDS within sensitive areas and continuously update signatures
D . Use syslog to gather data from multiple sources and detect intrusion logs for timely responses
Answer: A
Latest 350-201 Dumps Valid Version with 139 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund