Which of the following is the reason the ABC company’s security administrator is unable to determine the ori
The security administrator at ABC company received the following log information from an external
party:
10:45:01 EST, SRC 10.4.3.7:3056, DST 8.4.2.1:80, ALERT, Directory traversal
10:45:02 EST, SRC 10.4.3.7:3057, DST 8.4.2.1:80, ALERT, Account brute force
10:45:03 EST, SRC 10.4.3.7:3058, DST 8.4.2.1:80, ALERT, Port scan
The external party is reporting attacks coming from abc-company.com. Which of the following is
the reason the ABC company’s security administrator is unable to determine the origin of the
attack?
Which of the following security devices can be replicated on a Linux based computer using IP tables to inspect
Which of the following security devices can be replicated on a Linux based computer using IP
tables to inspect and properly handle network based traffic?
Which of the following firewall types inspects Ethernet traffic at the MOST levels of the OSI model?
Which of the following firewall types inspects Ethernet traffic at the MOST levels of the OSI
model?
Which of the following would BEST meet the CISO’s requirements?
The Chief Information Security Officer (CISO) has mandated that all IT systems with credit card
data be segregated from the main corporate network to prevent unauthorized access and that
access to the IT systems should be logged. Which of the following would BEST meet the CISO’s
requirements?
Which of the following network design elements allows for many internal devices to share one public IP address
Which of the following network design elements allows for many internal devices to share one
public IP address?
Which of the following is a best practice when securing a switch from physical access?
Which of the following is a best practice when securing a switch from physical access?
Which of the following devices would be MOST useful to ensure availability when there are a large number of re
Which of the following devices would be MOST useful to ensure availability when there are a large
number of requests to a certain website?
Which of the following would BEST address this?
Pete, the system administrator, wishes to monitor and limit users’ access to external websites.
Which of the following would BEST address this?
Which of the following would be BEST suited for this task?
Mike, a network administrator, has been asked to passively monitor network traffic to the
company’s sales websites. Which of the following would be BEST suited for this task?
Which of the following should be deployed to prevent the transmission of malicious traffic between virtual mac
Which of the following should be deployed to prevent the transmission of malicious traffic between
virtual machines hosted on a singular physical device on a network?