Which of the following are restricted to 64-bit block sizes?
Which of the following are restricted to 64-bit block sizes? (Select TWO).
Which of the following protocols provides transport security for virtual terminal emulation?
Which of the following protocols provides transport security for virtual terminal emulation?
select the appropriate authentication category from the dropdown choices.
Select the appropriate attack from each drop down list to label the corresponding illustrated attack
Drag and Drop the applicable controls to each asset type.
DRAG DROP
A Security administrator wants to implement strong security on the company smart phones and
terminal servers located in the data center. Drag and Drop the applicable controls to each asset type.
Instructions: Controls can be used multiple times and not all placeholders needs to be filled. When
you have completed the simulation, Please select Done to submit.
Determine the types of Attacks from right to specific action.
Drag the items “Types of Security” to appropriate Security devices.
DRAG DROP
You are the security administrator. You need to determine the types of security. Drag the items
“Types of Security” to appropriate Security devices.
The security administrator has installed a new firewall which implements an implicit DENY policy…
HOTSPOT
The security administrator has installed a new firewall which implements an implicit DENY policy
by default Click on the firewall and configure it to allow ONLY the following communication.
1. The Accounting workstation can ONLY access the web server on the public network over the
default HTTPS port. The accounting workstation should not access other networks.
2. The HR workstation should be restricted to communicate with the Financial server ONLY, over
the default SCP port
3. The Admin workstation should ONLY be able to access the servers on the secure network over
the default TFTP port.
Instructions: The firewall will process the rules in a top-down manner in order as a first match
The port number must be typed in and only one port number can be entered per rule Type ANY for
all ports. The original firewall configuration can be reset at any time by pressing the reset button.
Once you have met the simulation requirements, click save and then Done to submit.
which of the following are PII?
Used in conjunction, which of the following are PII? (Select TWO).
To identify any such users, the security administrator could:
Based on information leaked to industry websites, business management is concerned that
unauthorized employees are accessing critical project information for a major, well-known new
product. To identify any such users, the security administrator could: