which of the following ways should the firewall be configured?
An organization recently installed a firewall on the network. Employees must be able to send and
receive email from a POP3 server. In which of the following ways should the firewall be configured?
(Select TWO).
Which of the following attacks creates a buffer overflow to stop access to a system?
Which of the following attacks creates a buffer overflow to stop access to a system?
Which of the following network tools is used to identify running services on host devices?
Which of the following network tools is used to identify running services on host devices?
Which of the following allows a malicious attacker to view network traffic if the attacker is on the same netw
Which of the following allows a malicious attacker to view network traffic if the attacker is on the
same network segment as Joe, an administrator?
Which of the following should be configured?
A company only wants preapproved laptops to be able to connect to a wireless access point. Which
of the following should be configured?
Which of the following describes a single computer that is setup specifically to lure hackers into revealing t
Which of the following describes a single computer that is setup specifically to lure hackers into
revealing their methods, and preventing real attacks on the production network?
Which of the following will accomplish this objective?
Network upgrades have been completed and the WINS server was shutdown. It was decided that
NetBIOS network traffic will no longer be permitted. Which of the following will accomplish this
objective?
Which of the following is an example of two-factor authentication?
Which of the following is an example of two-factor authentication?
Which of the following protocols works at the LOWEST layer of the OSI model?
Which of the following protocols works at the LOWEST layer of the OSI model?
Which of the following port numbers should be the only allowed open ports on the firewall to accomplish this?
A company wants to only allow incoming HTTP and HTTPS traffic on their public wireless network.
Which of the following port numbers should be the only allowed open ports on the firewall to
accomplish this? (Select TWO).