Refer to the exhibit. An engineer received a report that an attacker has compromised a workstation and gained access to sensitive customer data from the network using insecure protocols. Which action prevents this type of attack in the future?
A.
Use VLANs to segregate zones and the firewall to allow only required services and secured protocols
B.
Deploy a SOAR solution and correlate log alerts from customer zones
C.
Deploy IDS within sensitive areas and continuously update signatures
D.
Use syslog to gather data from multiple sources and detect intrusion logs for timely responses
A. Use VLANs to segregate zones and the firewall to allow only required services and secured protocols. By using VLANs to segregate zones and the firewall to allow only required services and secured protocols, an organization can control the traffic that can enter or exit a particular network segment. This can prevent attackers from accessing sensitive customer data and reduce the likelihood of an attack in the future.
This section is not available anymore. Please use the main Exam Page.350-201 Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
DrVoIP
9 months, 3 weeks agoTOLU1985
1 year, 2 months ago