PrepAway - Latest Free Exam Questions & Answers

Author: seenagape

Which of the following designs is BEST suited for this purpose?

A startup company offering software on demand has hired a security consultant to provide
expertise on data security. The company’s clients are concerned about data confidentiality. The
security consultant must design an environment with data confidentiality as the top priority, over

availability and integrity. Which of the following designs is BEST suited for this purpose?

Modify the network diagram to prevent SQL injections. XSS attacks, smurf attacks, e-mail spam, downloaded malw

DRAG DROP
Company A has experienced external attacks on their network and wants to minimize the attacks
from reoccurring. Modify the network diagram to prevent SQL injections. XSS attacks, smurf
attacks, e-mail spam, downloaded malware. viruses and ping attacks. The company can spend a
MAXIMUM of 550.000 USD. A cost list for each item is listed below
1. Anti-Virus Server- $10,000
2 Firewall-$15,000
3 Load Balanced Server – $10,000
4 NIDS/NIPS-$10,000
5. Packet Analyzer-55.000
6 Patch Server-$15,000
7 Proxy Server-$20,000 8. Router – S10.000
9 Spam Filter – S5 000
10 Traffic Shaper – $20,000
11. Web Application Firewall – $10,000
Instructions: Not all placeholders in the diagram need to be filled and items can only be used once.

Based on this information, the following tasks need to be completed:

CORRECT TEXT
The IDS has detected abnormal behavior on this network Click on the network devices to view
device information Based on this information, the following tasks need to be completed:
1. Select the server that is a victim of a SQL injection attack.
2 Select the source of the buffer overflow attack.
3. Modify the access control list (ACL) on the router(s) to ONLY block the buffer overflow attack.
Instructions: Simulations can be reset at any time to the initial state: however, all selections will be deleted.