What are the two differences between stateful and deep packet inspection? (Choose two )
What does an attacker use to determine which network ports are listening on a potential target device?
Why should an engineer use a full packet capture to investigate a security breach?
What is the practice of giving employees only those permissions necessary to perform their specific role within an organization?
Which system monitors local system operation and local network access for violations of a security policy?
Which metric should be used when evaluating the effectiveness and scope of a Security Operations Center?