Which of the following should be implemented to secure the devices without risking availability?
A company has proprietary mission critical devices connected to their network which are configured
remotely by both employees and approved customers. The administrator wants to monitor device
security without changing their baseline configuration. Which of the following should be implemented to
secure the devices without risking availability?
Simulation Configure the firewall (fill out the table) to allow these four rules:
Click on the firewall and configure it to allow ONLY the following communication.
HOTSPOT
The security administrator has installed a new firewall which implements an implicit DENY policy by
default. Click on the firewall and configure it to allow ONLY the following communication.
1. The Accounting workstation can ONLY access the web server on the public network over the default
HTTPS port. The accounting workstation should not access other networks.
2. The HR workstation should be restricted to communicate with the Financial server ONLY, over the
default SCP port
3. The Admin workstation should ONLY be able to access the servers on the secure network over the
default TFTP port.
Instructions: The firewall will process the rules in a top-down manner in order as a first match The port
number must be typed in and only one port number can be entered per rule Type ANY for all ports. The
original firewall configuration can be reset at any time by pressing the reset button. Once you have met
the simulation requirements, click save and then Done to submit.
Which of the following firewall rules only denies DNS zone transfers?
Which of the following firewall rules only denies DNS zone transfers?
Which of the following would accomplish this task?
A security administrator suspects that an increase in the amount of TFTP traffic on the network is due to
unauthorized file transfers, and wants to configure a firewall to block all TFTP traffic.
Which of the following would accomplish this task?
How could Sara BEST accommodate the vendor?
Sara, a security technician, has received notice that a vendor coming in for a presentation will require
access to a server outside of the network. Currently, users are only able to access remote sites through a
VPN connection. How could Sara BEST accommodate the vendor?
Which of the following should be recommended to isolate the VMs from one another?
A technician is deploying virtual machines for multiple customers on a single physical host to reduce
power consumption in a data center. Which of the following should be recommended to isolate the VMs
from one another?
Which of the following is MOST likely the reason for the sub-interfaces?
A router has a single Ethernet connection to a switch. In the router configuration, the Ethernet interface
has three sub-interfaces, each configured with ACLs applied to them and 802.1q trunks.
Which of the following is MOST likely the reason for the sub-interfaces?
Which of the following actions should Joe recommend?
Joe, a technician at the local power plant, notices that several turbines had ramp up in cycles during the
week. Further investigation by the system engineering team determined that a timed .exe file had been
uploaded to the system control console during a visit by international contractors. Which of the following
actions should Joe recommend?
Which of the following would need to be implemented?
The security administrator needs to manage traffic on a layer 3 device to support FTP from a new remote
site. Which of the following would need to be implemented?