An audit report indicates multiple suspicious attempts to access company resources were made. These attempts were not detected by the company. Which of the following would be the best solution to implement on the company's network?
To address the issue of suspicious attempts to access company resources that were not detected, the best solution to implement on the company's network would be an Intrusion Prevention System (IPS).
An Intrusion Prevention System (IPS) is a security device or software application that monitors network traffic for malicious activity and can automatically take action to block or prevent potential threats. It goes beyond intrusion detection by actively analyzing network traffic in real-time and can actively respond to identified threats.
With an IPS in place, the system can detect and block suspicious activities, such as unauthorized attempts to access company resources, before they can cause harm. It provides an additional layer of security to the network and can help to mitigate various cyber threats.
To address the issue of suspicious attempts to access company resources that were not detected, the best solution to implement on the company's network would be an Intrusion Prevention System (IPS).
An Intrusion Prevention System (IPS) is a security device or software application that monitors network traffic for malicious activity and can automatically take action to block or prevent potential threats. It goes beyond intrusion detection by actively analyzing network traffic in real-time and can actively respond to identified threats.
With an IPS in place, the system can detect and block suspicious activities, such as unauthorized attempts to access company resources, before they can cause harm. It provides an additional layer of security to the network and can help to mitigate various cyber threats.
A. Intrusion prevention system
An Intrusion Prevention System (IPS) would be the best solution to implement on the company's network to detect and prevent suspicious attempts to access company resources. IPS monitors network and/or system activities for malicious exploits or security policy violations and can automatically respond to block or prevent those activities.
It's A because the company didn't have the IPS is why they didn't detect it to begin with. So getting the IPS provides the information needed. Jumpr server wouldn't attack it's own. This was an attack to get the resources.
jump server is the correct answer , it will not allow any one to access , only the authorized by inserting the username and password with MFA 'OTP'
upvoted 2 times
...
This section is not available anymore. Please use the main Exam Page.SY0-601 Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
ApplebeesWaiter1122
Highly Voted 1 year, 11 months agoCS3000
Highly Voted 1 year, 9 months agoMehe323
1 year, 1 month agomemodrums
1 year, 4 months agorussian
Most Recent 1 year, 2 months agokewokil120
1 year, 4 months agovitasaia
1 year, 4 months agodfc6822
1 year, 5 months agoMortG7
1 year, 5 months agoMade100
1 year, 6 months agotonnage800
1 year, 7 months agoComPCertOn
1 year, 7 months agoazzawim
1 year, 7 months ago