Which of the following types of vulnerabilities involves attacking a system to access adjacent hosts?
A security analyst is reviewing logs and discovers the following:
Which of the following should be used lo best mitigate this type of attack?
The Cruel Information Security Officer (CISO) asks a security analyst to install an OS update to a production VM that has a 99% uptime SLA. The CISO tells me analyst the installation must be done as quickly as possible. Which of the following courses of action should the security analyst take first?
A systems administrate wants to implement a backup solution. the solution needs to allow recovery of the entire system, including the operating system, in case of a disaster. Which of the following backup types should the administrator consider?