Recommendation scans can detect applications and/or vulnerabilities on servers on the network. Which of the following Protection Modules make use of Recommendation scans?
Recommendation Scans can suggest rules for the following Protection Modules:
* Intrusion Prevention
* Integrity Monitoring
* Log Inspection
Explication: Study Guide - page (161)
Jerry
10 months agoJulie
10 months agoCathrine
10 months agoJulie
10 months agoColby
10 months agoTimothy
10 months agoIsabella
10 months agoTimothy
11 months agoColby
11 months agoIsabella
11 months ago