Which of the following delineates why it is important to perform egress filtering and monitoring on Internet c
Which of the following delineates why it is important to perform egress filtering and monitoring on
Internet connected security zones of interfaces on a firewall?
Which of the following controls should be implemented to curtail this activity?
The help desk is receiving numerous password change alerts from users in the accounting department.
These alerts occur multiple times on the same day for each of the affected users’ accounts. Which of the
following controls should be implemented to curtail this activity?
Which of the following would enhance the security of accessing data stored in the cloud?
Which of the following would enhance the security of accessing data stored in the cloud? (Select TWO)
Which of the following is preventing the remote user from being able to access the workstation?
A remote user (User1) is unable to reach a newly provisioned corporate windows workstation. The system
administrator has been given the following log files from the VPN, corporate firewall and workstation
host.
Which of the following is preventing the remote user from being able to access the workstation?
when should this problem best be revisited?
During a data breach cleanup, it is discovered that not all of the sites involved have the necessary data
wiping tools. The necessary tools are quickly distributed to the required technicians, but when should this
problem best be revisited?
Which of the following will the audit team most l likely recommend during the audit out brief?
During a third-party audit, it is determined that a member of the firewall team can request, approve, and
implement a new rule-set on the firewall. Which of the following will the audit team most l likely
recommend during the audit out brief?
Which of the following is the appropriate network structure used to protect servers…?
Which of the following is the appropriate network structure used to protect servers and services that
must be provided to external clients without completely eliminating access for internal users?
Which of the following will most likely fix the uploading issue for the users?
An administrator has configured a new Linux server with the FTP service. Upon verifying that the service
was configured correctly, the administrator has several users test the FTP service. Users report that they
are able to connect to the FTP service and download their personal files, however, they cannot transfer
new files to the server. Which of the following will most likely fix the uploading issue for the users?
Which of the following actions will help detect attacker attempts to further alter log files?
An administrator thinks the UNIX systems may be compromised, but a review of system log files provides
no useful information. After discussing the situation with the security team, the administrator suspects
that the attacker may be altering the log files and removing evidence of intrusion activity. Which of the
following actions will help detect attacker attempts to further alter log files?
Which of the following controls reduces the risk created by malicious gaming customers attempting to circumven
A global gaming console manufacturer is launching a new gaming platform to its customers. Which of the
following controls reduces the risk created by malicious gaming customers attempting to circumvent
control by way of modifying consoles?