List of questions
Related questions
Question 243 - SY0-601 discussion
A security engineer is concerned the strategy for detection on endpoints is too heavily dependent on previously defined attacks. The engineer wants a tool that can monitor for changes to key files and network traffic for the device. Which of the following tools should the engineer select?
A.
HIDS
B.
AV
C.
NGF-W
D.
DLP
Your answer:
0 comments
Sorted by
Leave a comment first