ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 31 - SPLK-5001 discussion

Report
Export

What device typically sits at a network perimeter to detect command and control and other potentially suspicious traffic?

A.
Host-based firewall
Answers
A.
Host-based firewall
B.
Web proxy
Answers
B.
Web proxy
C.
Endpoint Detection and Response
Answers
C.
Endpoint Detection and Response
D.
Intrusion Detection System
Answers
D.
Intrusion Detection System
Suggested answer: D
asked 23/09/2024
mohammed rafiuddin
38 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first