InterviewSolution
| 1. |
How Are You Monitoring For Trojans And Back Doors? |
|
Answer» In addition to periodic vulnerability scanning, outgoing TRAFFIC should be INSPECTED before it leaves the network, looking for potentially compromised systems. Organizations OFTEN FOCUS on traffic and attacks coming into the network and forget about monitoring outgoing traffic. Not only will this detect compromised systems with Trojans and backdoors, but it will also detect potentially MALICIOUS or inappropriate insider activity. In addition to periodic vulnerability scanning, outgoing traffic should be inspected before it leaves the network, looking for potentially compromised systems. Organizations often focus on traffic and attacks coming into the network and forget about monitoring outgoing traffic. Not only will this detect compromised systems with Trojans and backdoors, but it will also detect potentially malicious or inappropriate insider activity. |
|