Which of the following should the administrator ensure during the test of a disaster recovery plan?
You work as an Incident handling manager for Orangesect Inc. You detect a virus attack incident in the network of your company. You develop a signature based on the characteristics of the detected virus. Which of the following phases in the Incident handling process will utilize the signature to resolve this incident?
Which of the following protocols uses the Internet key Exchange (IKE) protocol to set up security associations (SA)?
Which of the following protocols multicasts messages and information among all member devices in an IP multicast group?