Which of the following tactics might be considered a part of a proactive network defense?

Which of the following tactics might be considered a part of a proactive network defense?

Which of the following tactics might be considered a part of a proactive network defense?

A.
Redundant firewalls

B.
Business Continuity planning

C.
Disallowing P2P traffic

D.
Perimeter surveillance and intelligence gathering

Explanation:
D: Ideally to counter an attack, network security must also be proactive, anticipate, and oppose the attack against their infrastructure by interdicting and disrupting an attack preemptively or in self-defense. This requires intelligence on the threat, active surveillance at the perimeter and beyond, and the ability to intercede upstream or disable a threat agents tools. Page 742.



Leave a Reply 1

Your email address will not be published. Required fields are marked *


joe

joe

Ideally to counter an attack, network security must also be proactive, anticipate, and oppose the attack against their infrastructure by interdicting and disrupting an attack preemptively or in self-defense. This requires intelligence on the threat, active surveillance at the perimeter and beyond, and the ability to intercede upstream or disable a threat agents tools.

理想的情況下反擊的攻擊,網絡安全也必須積極主動,預測,並通過阻截和干擾攻擊或先發製人自衛反對對他們的基礎設施的攻擊。這就需要對威脅情報,在周邊和超越,上游說情或禁用威脅代理工具的能力,主動監測。