200-201 Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS)
An engineer receives a security alert that traffic with a known TOR exit node has occurred on the network.
An engineer receives a security alert that traffic with a known TOR exit node has occurred on the network.
What is the impact of this traffic?
- A . ransomware communicating after infection
- B . users downloading copyrighted content
- C . data exfiltration
- D . user circumvention of the firewall