You have discovered suspicious activity in your network. What is the BEST immediate action to take?
You have discovered suspicious activity in your network. What is the BEST immediate action to take?
Creating a Suspicious Activity Monitoring (SAM) rule to block the traffic is the best immediate action when suspicious activity is detected in the network. SAM rules are specifically designed to quickly respond to and mitigate ongoing suspicious activities. Unlike policy rules, SAM rules are dynamic and can be adjusted or removed once the threat has been fully identified and addressed, allowing for more agile and effective threat response.
D os correct
D is correct
D is correct
Create SAM rule, D
D is the correct one
D is correct