According to the Risk Matrix table, what will be the risk level when the probability of an attack is very high, and the impact of that attack is major?
NOTE: It is mandatory to answer the question before proceeding to the next one.
Correct Answer:A
Which of the following command is used to enable logging in iptables?
Correct Answer:B
Which of the following security technology is used to attract and trap people who attempt unauthorized or illicit utilization of the host system?
Correct Answer:C
Which of the following Windows features is used to enable Security Auditing in Windows?
Correct Answer:C
Where will you find the reputation IP database, if you want to monitor traffic from known bad IP reputation using OSSIM SIEM?
Correct Answer:A
Which of the following Windows Event Id will help you monitors file sharing across the network?
Correct Answer:C