Which of the following should Sara configure?
Sara, the security administrator, must configure the corporate firewall to allow all public IP addresses on
the internal interface of the firewall to be translated to one public IP address on the external interface of
the same firewall. Which of the following should Sara configure?
Which of the following devices is MOST likely being used when processing the following?
Which of the following devices is MOST likely being used when processing the following?
1 PERMIT IP ANY ANY EQ 80
2 DENY IP ANY ANY
Which of the following is the reason the ABC company’s security administrator is unable to determine the ori
The security administrator at ABC company received the following log information from an external party:
10:45:01 EST, SRC 10.4.3.7:3056, DST 8.4.2.1:80, ALERT, Directory traversal
10:45:02 EST, SRC 10.4.3.7:3057, DST 8.4.2.1:80, ALERT, Account brute force
10:45:03 EST, SRC 10.4.3.7:3058, DST 8.4.2.1:80, ALERT, Port scanThe external party is reporting attacks coming from abc-company.com. Which of the following is the
reason the ABC company’s security administrator is unable to determine the origin of the attack?
Which of the following security devices can be replicated on a Linux based computer using IP tables to inspect
Which of the following security devices can be replicated on a Linux based computer using IP tables to
inspect and properly handle network based traffic?
Which of the following firewall types inspects Ethernet traffic at the MOST levels of the OSI model?
Which of the following firewall types inspects Ethernet traffic at the MOST levels of the OSI model?
Which of the following would BEST meet the CISO’s requirements?
The Chief Information Security Officer (CISO) has mandated that all IT systems with credit card data be
segregated from the main corporate network to prevent unauthorized access and that access to the IT
systems should be logged. Which of the following would BEST meet the CISO’s requirements?
Which of the following network design elements allows for many internal devices to share one public IP address
Which of the following network design elements allows for many internal devices to share one public IP
address?
Which of the following is a best practice when securing a switch from physical access?
Which of the following is a best practice when securing a switch from physical access?
Which of the following devices would be MOST useful to ensure availability when there are a large number of re
Which of the following devices would be MOST useful to ensure availability when there are a large
number of requests to a certain website?
Which of the following would BEST address this?
Pete, the system administrator, wishes to monitor and limit users’ access to external websites.
Which of the following would BEST address this?