Question 6 of 114Which of the following is a recommended function of the SOC’s command center?
Correct Answer: C
Question 7 of 114An organization wants a perimeter device to inspect and transmit email requests from the internet to the internal email server. Which of the following is used for this purpose?
Correct Answer: B
Question 8 of 114What type of hosts did the Mirai botnet target for infection?
Correct Answer: C
Question 9 of 114What can be used to segment a virtual private cloud into smaller network segments?
Correct Answer: A
Question 10 of 114When mutual TLS authentication is in use, which of the following would an attacker need to steal in order to access the user’s data?