Multiple Choice
An Incident Responder has noticed that for the last month, the same endpoints have been involved with malicious traffic every few days. The network team also identified a large amount of bandwidth being used over P2P protocol. Which two steps should the Incident Responder take to restrict the endpoints while maintaining normal use of the systems? (Choose two.)
A) Report the users to their manager for unauthorized usage of company resources
B) Blacklist the domains and IP associated with the malicious traffic
C) Isolate the endpoints
D) Blacklist the endpoints
E) Find and blacklist the P2P client application
Correct Answer:

Verified
Correct Answer:
Verified
Q318: What is the default limit to the
Q319: In which caching technique does the ProxySG
Q320: Which VPM layer can be most commonly
Q321: You are managing Storage Foundation 5.0 server
Q322: You need to increase the size of
Q324: An administrator pulls the Services and Operation
Q325: What is the risk to the inventory
Q326: Which email client is compatible with the
Q327: You want to allow non-layered volume to
Q328: Which action is available for use in