Professional Documents
Culture Documents
Answer: B
Explanation:
Information security should check the intrusion detection system (IDS) logs and
continue to monitor the situation. It would be inappropriate to take any action beyond
that. In fact, updating the IDS could create a temporary exposure until the new version
can be properly tuned. Rebooting the router and enabling server trace routing would not
be warranted.