Free 412-79V9 Exam Braindumps (page: 6)

Page 6 of 91

B. ./snort -dev -l ./log
C. ./snort -dv -r packet.log
D. ./snort -l ./log -b

Answer(s): C
QUESTION: 9
Which of the following approaches to vulnerability assessment relies on the administrator
providing baseline of system configuration and then scanning continuously without incorporating
any information found at the time of scanning?

A. Service-based Assessment Solutions
B. Product-based Assessment Solutions
C. Tree-based Assessment
D. Inference-based Assessment

Answer(s): C
Reference:
http://www.netsense.info/downloads/security_wp_mva.pdf (page 12, tree-based assessment
technology, second para)
QUESTION: 10
Today, most organizations would agree that their most valuable IT assets reside within
applications and databases. Most would probably also agree that these are areas that have the
weakest levels of security, thus making them the prime target for malicious activity from system
administrators, DBAs, contractors, consultants, partners, and customers.
https://Free-Braindumps.com




Post your Comments and Discuss EC-Council 412-79V9 exam prep with other Community members: