Question 6 of 111Which of the following is a recommended function of the SOC’s command center?
Correct Answer: C
Question 7 of 111An organization wants a perimeter device to inspect and transmit email requests from the internet to the internal email server. Which of the following is used for this purpose?
Correct Answer: B
Question 8 of 111What type of hosts did the Mirai botnet target for infection?
Correct Answer: C
Question 9 of 111What can be used to segment a virtual private cloud into smaller network segments?
Correct Answer: A
Question 10 of 111When mutual TLS authentication is in use, which of the following would an attacker need to steal in order to access the user’s data?