24.11.2017 Views

412-79V9 Exam Practice Software

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

A. NIDS are usually a more expensive solution to implement compared to HIDS.<br />

B. Attempts to install Trojans or backdoors cannot be monitored by a HIDS whereas NIDS can monitor<br />

and stop such intrusion events.<br />

C. NIDS are standalone hardware appliances that include network intrusion detection capabilities<br />

whereas HIDS consist of software agents installed on individual computers within the system.<br />

D. HIDS requires less administration and training compared to NIDS.<br />

Question: 4<br />

Answer: C<br />

Which vulnerability assessment phase describes the scope of the assessment, identifies and ranks the<br />

critical assets, and creates proper information protection procedures such as effective planning,<br />

scheduling, coordination, and logistics?<br />

A. Threat-Assessment Phase<br />

B. Pre-Assessment Phase<br />

C. Assessment Phase<br />

D. Post-Assessment Phase<br />

Question: 5<br />

Answer: B<br />

Visit us athttps://www.certsgrade.com/pdf/<strong>412</strong>-79v9/

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!