An organization implements a security system that inspects all incoming network packets and blocks those matching known attack signatures. Despite this, a new variant of malware successfully infiltrates the network because its code pattern differs from previously identified threats.
This limitation MOST directly illustrates:
Stateless firewall vulnerability
Signature-based detection weakness
Perimeter defense inadequacy
Encryption protocol failure
Boost your performance with adaptive practice tests
Practice every concept in the syllabus
Compare your speed and accuracy with your peers
Download the app and practice on the go