Which of the following devices would be MOST useful to …
Which of the following devices would be MOST useful to ensure availability when there are a large number of
requests to a certain website?
Which of the following is the best practice when securi…
Which of the following is the best practice when securing a switch from physical access?
Which of the following network design elements allows f…
Which of the following network design elements allows for many internal devices to share one public IP
address?
Which of the following would BEST meet the CISO’s requi…
The Chief Information Security Officer (CISO) has mandated that all IT systems with credit card data should be
segregated from the main corporate network to prevent unauthorized access and that access to the IT systems
should be logged.
Which of the following would BEST meet the CISO’s requirements?
Which of the following firewall types inspects Ethernet…
Which of the following firewall types inspects Ethernet traffic at the MOST levels of the OSI model?
Which of the following security devices can be replicat…
Which of the following security devices can be replicated on a Linux based computer using IP tables to inspect
and properly handle network based traffic?
Which of the following is the reason the ABC company’s …
The security administrator at ABC company received the following log information from an external party:
10:45:01 EST, SRC 10.4.3.7:3056, DST 8.4.2.1:80, ALERT, Directory traversal
10:45:02 EST, SRC 10.4.3.7:3057, DST 8.4.2.1:80, ALERT, Account brute force
10:45:03 EST, SRC 10.4.3.7:3058, DST 8.4.2.1:80, ALERT, Port scan
The external party is reporting attacks coming from abc-company.com. Which of the following is the reason the
ABC company’s security administrator is unable to determine the origin of the attack?
Which of the following devices is MOST likely being use…
Which of the following devices is MOST likely being used when processing the following?
1 PERMIT IP ANY ANY EQ 80
2 DENY IP ANY ANY
Which of the following should Sara configure?
Sara, the security administrator, must configure the corporate firewall to allow all public IP addresses on the
internal interface of the firewall to be translated to one public IP address on the external interface of the same
firewall. Which of the following should Sara configure?