Question 6 of 111
Which of the following is a recommended function of the SOC’s command center?
    Correct Answer: C

Question 7 of 111
An organization wants a perimeter device to inspect and transmit email requests from the internet to the internal email server.
Which of the following is used for this purpose?
    Correct Answer: B

Question 8 of 111
What type of hosts did the Mirai botnet target for infection?
    Correct Answer: C

Question 9 of 111
What can be used to segment a virtual private cloud into smaller network segments?
    Correct Answer: A

Question 10 of 111
When mutual TLS authentication is in use, which of the following would an attacker need to steal in order to access the user’s data?
    Correct Answer: D