Which of the following ports would need to be opened on the firewall in order for this VPN to function properl
A company has implemented PPTP as a VPN solution. Which of the following ports would need to
be opened on the firewall in order for this VPN to function properly? (Select TWO).
Which of the following describes how the employee is leaking these secrets?
A security analyst has been notified that trade secrets are being leaked from one of the executives
in the corporation. When reviewing this executive’s laptop they notice several pictures of the
employee’s pets are on the hard drive and on a cloud storage network. When the analyst hashes
the images on the hard drive against the hashes on the cloud network they do not match. Which of
the following describes how the employee is leaking these secrets?
Which of the following is this an example of?
Mike, a user, states that he is receiving several unwanted emails about home loans. Which of the
following is this an example of?
Which of the following should be disabled to mitigate this risk?
During a routine audit a web server is flagged for allowing the use of weak ciphers. Which of the
following should be disabled to mitigate this risk? (Select TWO).
Which of the following must a user implement if they want to send a secret message to a coworker by embedding
Which of the following must a user implement if they want to send a secret message to a coworker by embedding it within an image?
which of the following can be inferred about the above environment?
Review the following diagram depicting communication between PC1 and PC2 on each side of a
router. Analyze the network traffic logs which show communication between the two computers as
captured by the computer with IP 10.2.2.10.
DIAGRAM
PC1 PC2
[192.168.1.30]——–[INSIDE 192.168.1.1 router OUTSIDE 10.2.2.1]———[10.2.2.10]
LOGS
10:30:22, SRC 10.2.2.1:3030, DST 10.2.2.10:80, SYN
10:30:23, SRC 10.2.2.10:80, DST 10.2.2.1:3030, SYN/ACK
10:30:24, SRC 10.2.2.1:3030, DST 10.2.2.10:80, ACK
Given the above information, which of the following can be inferred about the above environment?
Which of the following can be implemented?
The Chief Information Officer (CIO) wants to implement a redundant server location to which the
production server images can be moved within 48 hours and services can be quickly restored, in
case of a catastrophic failure of the primary datacenter’s HVAC. Which of the following can be
implemented?
Which of the following protocols must he allow through the firewall to ensure the web servers can be reached v
Pete, a network administrator, is implementing IPv6 in the DMZ. Which of the following protocols
must he allow through the firewall to ensure the web servers can be reached via IPv6 from an IPv6
enabled Internet host?
Which of the following has happened on the workstation?
The security administrator is observing unusual network behavior from a workstation. The
workstation is communicating with a known malicious destination over an encrypted tunnel. A full
antivirus scan, with an updated antivirus definition file, does not show any signs of infection. Which
of the following has happened on the workstation?
How could Sara BEST accommodate the vendor?
Sara, a security technician, has received notice that a vendor coming in for a presentation will
require access to a server outside of the network. Currently, users are only able to access remote
sites through a VPN connection. How could Sara BEST accommodate the vendor?