Posted by: Pdfprep
Post Date: December 13, 2020
A security breach occurred in a datacenter. An analysis of the HIPS log files on a sever reveals an intrusion was logged, but no action was taken to prevent the intrusion.
Which of the following represents how the HIPS should have been configured to prevent the intrusion, while also creating an alert?
A . Block
B . Warn
C . Allow
D . Log
Answer: A
Leave a Reply