ECCouncil Related Exams
512-50 Exam
As the Chief Information Security Officer, you are performing an assessment of security posture to understand
what your Defense-in-Depth capabilities are. Which network security technology examines network traffic flows
to detect and actively stop vulnerability exploits and attacks?
Which of the following are the MOST important factors for proactively determining system vulnerabilities?