Which of the following technologies was MOST likely bei…
A security engineer is reviewing log data and sees the output below:
POST: /payload.php HTTP/1.1
HOST: localhost
Accept: */*
Referrer: http://localhost/
*******
HTTP/1.1 403 Forbidden
Connection: close
Log: Access denied with 403. Pattern matches form bypass Which of the following technologies was MOST
likely being used to generate this log?
Which of the following should the security administrato…
Which of the following should the security administrator implement to limit web traffic based on country oforigin? (Choose three.)
Which of the following is BEST at blocking attacks and …
Which of the following is BEST at blocking attacks and providing security at layer 7 of the OSI model?
Which of the following is suited for this purpose?
A review of the company’s network traffic shows that most of the malware infections are caused by users
visiting gambling and gaming websites. The security manager wants to implement a solution that will block
these websites, scan all web traffic for signs of malware, and block the malware before it enters the company
network. Which of the following is suited for this purpose?
Which of the following is MOST likely blocking Pete’s a…
Pete, an employee, attempts to visit a popular social networking site but it is blocked. Instead, a page is
displayed notifying him that this site cannot be visited.
Which of the following is MOST likely blocking Pete’s access to this site?
Layer 7 devices used to prevent specific types of html …
Layer 7 devices used to prevent specific types of html tags are called:
Which of the following might the administrator need to …
The administrator receives a call from an employee named Joe. Joe says the Internet is down and he is
receiving a blank page when typing to connect to a popular sports website. The administrator asks Joe to try
visiting a popular search engine site, which Joe reports as successful. Joe then says that he can get to the
sports site on this phone. Which of the following might the administrator need to configure?
Which of the following devices would BEST achieve this goal?
Pete, the system administrator, wants to restrict access to advertisements, games, and gambling websites.
Which of the following devices would BEST achieve this goal?
Which of the following components of an all-in-one secu…
Which of the following components of an all-in-one security appliance would MOST likely be configured in order
to restrict access to peer-to-peer file sharing websites?
Which the following flags are used to establish a TCP c…
Which the following flags are used to establish a TCP connection? (Choose two.)