which of the following can be inferred about the above environment?
Review the following diagram depicting communication between PC1 and PC2 on each side of a
router. Analyze the network traffic logs which show communication between the two computers as
captured by the computer with IP 10.2.2.10.
DIAGRAM
PC1 PC2
[192.168.1.30]——–[INSIDE 192.168.1.1 router OUTSIDE 10.2.2.1]———[10.2.2.10]
LOGS
10:30:22, SRC 10.2.2.1:3030, DST 10.2.2.10:80, SYN
10:30:23, SRC 10.2.2.10:80, DST 10.2.2.1:3030, SYN/ACK
10:30:24, SRC 10.2.2.1:3030, DST 10.2.2.10:80, ACK
Given the above information, which of the following can be inferred about the above environment?
Which of the following can be implemented?
The Chief Information Officer (CIO) wants to implement a redundant server location to which the
production server images can be moved within 48 hours and services can be quickly restored, in
case of a catastrophic failure of the primary datacenter’s HVAC. Which of the following can be
implemented?
Which of the following has happened on the workstation?
The security administrator is observing unusual network behavior from a workstation. The
workstation is communicating with a known malicious destination over an encrypted tunnel. A full
antivirus scan, with an updated antivirus definition file, does not show any signs of infection. Which
of the following has happened on the workstation?
Which of the following should be performed to increase the availability of IP telephony by prioritizing traffi
Which of the following should be performed to increase the availability of IP telephony by
prioritizing traffic?
Which of the following controls can be used to prevent the disclosure of sensitive information stored on a mob
Which of the following controls can be used to prevent the disclosure of sensitive information
stored on a mobile device’s removable media in the event that the device is lost or stolen?
Which of the following protocols would have been affected by this?
A malicious program modified entries in the LMHOSTS file of an infected system. Which of the
following protocols would have been affected by this?
Which of the following protocols would have been affected by this?
A malicious program modified entries in the LMHOSTS file of an infected system. Which of the
following protocols would have been affected by this?
Which of the following attacks MOST likely occurred?
A victim is logged onto a popular home router forum site in order to troubleshoot some router
configuration issues. The router is a fairly standard configuration and has an IP address of
192.168.1.1. The victim is logged into their router administrative interface in one tab and clicks a
forum link in another tab. Due to clicking the forum link, the home router reboots. Which of the
following attacks MOST likely occurred?
Which of the following assets is MOST likely considered for DLP?
Which of the following assets is MOST likely considered for DLP?
which of the following when sending an email to a recipient for the first time?
In order to securely communicate using PGP, the sender of an email must do which of the
following when sending an email to a recipient for the first time?