اختبار شهادة Certified Ethical Hacker (CEH) V13

السؤال 230 من 270

كل الأسئلة

Despite strong technical controls such as firewalls, IDS/IPS, and anti-malware, Peter Smith argues that there is still a “weakest link” in the security chain that attackers can exploit. What is he referring to?

الخيارات

  • A Untrained staff or ignorant users who inadvertently become the weakest link
  • B Zero-day exploits that IDS cannot detect
  • C Polymorphic viruses that AV cannot detect
  • D Spam emails that bypass gateway filters

النقاشات

لا توجد نقاشات منشورة لهذا السؤال حالياً.