Drag and drop the correct protocol to its default port.
CORRECT TEXT Configure the firewall (fill out the table) to allow these four rules:
Drag the items on the left to show the different types of security for the shown devices.
Determine the types of attacks below by selecting an option from the dropdown list.
Drag and Drop the applicable controls to each asset type.
DRAG DROP
A Security administrator wants to implement strong security on the company smart phones and
terminal servers located in the data center.
Drag and Drop the applicable controls to each asset type.
Instructions: Controls can be used multiple times and not all placeholders needs to be filled. When
you have completed the simulation, Please select Done to submit.
Which of the following BEST describes a protective countermeasure for SQL injection?
Which of the following BEST describes a protective countermeasure for SQL injection?
Click on the firewall and configure it to allow ONLY the following communication.
HOTSPOT
The security administrator has installed a new firewall which implements an implicit DENY policy
by default Click on the firewall and configure it to allow ONLY the following communication.
1. The Accounting workstation can ONLY access the web server on the public network over the
default HTTPS port. The accounting workstation should not access other networks.
2. The HR workstation should be restricted to communicate with the Financial server ONLY, over
the default SCP port
3. The Admin workstation should ONLY be able to access the servers on the secure network over
the default TFTP port.
Instructions: The firewall will process the rules in a top-down manner in order as a first match
The port number must be typed in and only one port number can be entered per rule Type ANY for
all ports. The original firewall configuration can be reset at any time by pressing the reset button.
Once you have met the simulation requirements, click save and then Done to submit.
Drag and drop the appropriate security controls on the floor plan.
DRAG DROP
You have been tasked with designing a security plan for your company. Drag and drop the appropriate security controls on the floor plan-Instructions: All objects must be used and all place
holders must be filled Order does not matter When you have completed the simulation, please
select the Done button to submit.
Which of the following MOST interferes with network-based detection techniques?
Which of the following MOST interferes with network-based detection techniques?
which of the following actions in PKI?
A certificate authority takes which of the following actions in PKI?