what filtering at the perimeter router should you implement?
When allowing syslog access from devices outside a firewall, what filtering at the perimeter router should you implement?
what type of filtering at the egress router should be implemented?
If you permit syslog access from devices on the outside of a firewall, what type of filtering at the egress router should be implemented?
How do you check syslog information to ensure that it has not been altered in transit?
You are the administrator at Certkiller Inc. and you need to checkout syslogs for information. How do you check syslog information to ensure that it has not been altered in transit?
when using TFTP?
You are the administrator at Certkiller Inc. and you need to mitigate threats to the network. How do you mitigate the threats presented when using TFTP?
What is the earliest version of NTP that supports a cryptographic authentication mechanism between peers?
James the security administrator is working on cryptographic authentication. What is the earliest version of NTP that supports a cryptographic authentication mechanism between peers?
What service is provided by CSA Profiler?
What service is provided by CSA Profiler?
Which attack is executed by Java applets and ActiveX controls?
Which attack is executed by Java applets and ActiveX controls?
What are two characteristics of a packet sniffer designed for attack purposes?
What are two characteristics of a packet sniffer designed for attack purposes? (Choose two)
What is the primary method of mitigating port redirection attacks?
What is the primary method of mitigating port redirection attacks?
What is not a specific type of attack, but refers to most attacks that occur today?
What is not a specific type of attack, but refers to most attacks that occur today?