Which of the following components of an all-in-one security appliance would MOST likely be configured in order
Which of the following components of an all-in-one security appliance would MOST likely be
configured in order to restrict access to peer-to-peer file sharing websites?
Which of the following devices would BEST achieve this goal?
Pete, the system administrator, wants to restrict access to advertisements, games, and gambling
web sites. Which of the following devices would BEST achieve this goal?
Which of the following might the administrator need to configure?
The administrator receives a call from an employee named Joe. Joe says the Internet is down and
he is receiving a blank page when typing to connect to a popular sports website. The administrator
asks Joe to try visiting a popular search engine site, which Joe reports as successful. Joe then
says that he can get to the sports site on this phone. Which of the following might the administrator
need to configure?
Layer 7 devices used to prevent specific types of html tags are called:
Layer 7 devices used to prevent specific types of html tags are called:
Which of the following is MOST likely blocking Pete’s access to this site?
Pete, an employee, attempts to visit a popular social networking site but is blocked. Instead, a
page is displayed notifying him that this site cannot be visited. Which of the following is MOST
likely blocking Pete’s access to this site?
Which of the following is suited for this purpose?
A review of the company’s network traffic shows that most of the malware infections are caused by
users visiting gambling and gaming websites. The security manager wants to implement a solution
that will block these websites, scan all web traffic for signs of malware, and block the malware
before it enters the company network. Which of the following is suited for this purpose?
Which of the following is BEST at blocking attacks and providing security at layer 7 of the OSI model?
Which of the following is BEST at blocking attacks and providing security at layer 7 of the OSI
model?
Which of the following should the security administrator implement to limit web traffic based on country of or
Which of the following should the security administrator implement to limit web traffic based on
country of origin? (Select THREE).
Which of the following technologies was MOST likely being used to generate this log?
A security engineer is reviewing log data and sees the output below:
POST: /payload.php HTTP/1.1
HOST: localhost
Accept: */*
Referrer: http://localhost/
*******
HTTP/1.1 403 Forbidden
Connection: close
Log: Access denied with 403. Pattern matches form bypass Which of the following technologies
was MOST likely being used to generate this log?
Which of the following would be the BEST place to start?
An administrator would like to review the effectiveness of existing security in the enterprise. Which
of the following would be the BEST place to start?