Drag and drop the appropriate security controls on the floor plan…
DRAG DROP
You have been tasked with designing a security plan for your company. Drag and drop the
appropriate security controls on the floor plan-Instructions: All objects must be used and all
place holders must be filled Order does not matter When you have completed the simulation,
please select the Done button to submit.
Click on the firewall and configure it to allow ONLY the following communication.
HOTSPOT
The security administrator has installed a new firewall which implements an implicit DENY
policy by default Click on the firewall and configure it to allow ONLY the following
communication.
1. The Accounting workstation can ONLY access the web server on the public network over
the default HTTPS port. The accounting workstation should not access other networks.
2. The HR workstation should be restricted to communicate with the Financial server ONLY,
over the default SCP port
3. The Admin workstation should ONLY be able to access the servers on the secure network
over the default TFTP port.
Instructions: The firewall will process the rules in a top-down manner in order as a first match
The port number must be typed in and only one port number can be entered per rule Type
ANY for all ports. The original firewall configuration can be reset at any time by pressing the
reset button. Once you have met the simulation requirements, click save and then Done to submit.
Which of the following BEST describes a protective countermeasure for SQL injection?
Which of the following BEST describes a protective countermeasure for SQL injection?
Which of the following MOST interferes with network-based detection techniques?
Which of the following MOST interferes with network-based detection techniques?
which of the following actions in PKI?
A certificate authority takes which of the following actions in PKI?
which of the following attacks?
Use of a smart card to authenticate remote servers remains MOST susceptible to which of
the following attacks?
which of the following?
Separation of duties is often implemented between developers and administrators in order to
separate which of the following?
Which of the following MUST be done before any actual switch configuration is performed?
A security administrator needs to update the OS on all the switches in the company. Which
of the following MUST be done before any actual switch configuration is performed?
Which of the following attacks is being described?
Jane, an individual, has recently been calling various financial offices pretending to be
another person to gain financial information. Which of the following attacks is being
described?
Which of the following security controls will MOST likely be implemented within the company?
A user in the company is in charge of various financial roles but needs to prepare for an
upcoming audit. They use the same account to access each financial system. Which of the
following security controls will MOST likely be implemented within the company?