Here’s the Answer to the Question posted on Facebook
Q. A HIDS reported a vulnerability on a system using an assigned vulnerability identification number. After researching the number on the vendor’s web site, you identify the recommended solution and begin applying it. What type of HIDS is in use?
Answer available until June 20, 2016.
|Get over 400 Security+ (SY0-401 questions here).|
See Chapter 4 of the CompTIA Security+: Get Certified Get Ahead: SY0-401 Study Guide.