Which of the following components of an all-in-one security appliance would MOST likely be configured in order
Which of the following components of an all-in-one security appliance would MOST likely be configured in
order to restrict access to peer-to-peer file sharing websites?
Which of the following devices would BEST achieve this goal?
Pete, the system administrator, wants to restrict access to advertisements, games, and gambling web
sites. Which of the following devices would BEST achieve this goal?
Which of the following might the administrator need to configure?
The administrator receives a call from an employee named Joe. Joe says the Internet is down and he is
receiving a blank page when typing to connect to a popular sports website. The administrator asks Joe to
try visiting a popular search engine site, which Joe reports as successful. Joe then says that he can get to
the sports site on this phone. Which of the following might the administrator need to configure?
Layer 7 devices used to prevent specific types of html tags are called:
Layer 7 devices used to prevent specific types of html tags are called:
Which of the following is MOST likely blocking Pete’s access to this site?
Pete, an employee, attempts to visit a popular social networking site but is blocked. Instead, a page is
displayed notifying him that this site cannot be visited. Which of the following is MOST likely blocking
Pete’s access to this site?
Which of the following is suited for this purpose?
A review of the company’s network traffic shows that most of the malware infections are caused by users
visiting gambling and gaming websites. The security manager wants to implement a solution that will
block these websites, scan all web traffic for signs of malware, and block the malware before it enters the
company network. Which of the following is suited for this purpose?
Which of the following is BEST at blocking attacks and providing security at layer 7 of the OSI model?
Which of the following is BEST at blocking attacks and providing security at layer 7 of the OSI model?
Which of the following should the security administrator implement to limit web traffic based on country of or
Which of the following should the security administrator implement to limit web traffic based on country
of origin? (Select THREE).
Which of the following technologies was MOST likely being used to generate this log?
A security engineer is reviewing log data and sees the output below:
POST: /payload.php HTTP/1.1
HOST: localhost
Accept: */*
Referrer: http://localhost/
*******
HTTP/1.1 403 Forbidden
Connection: close
Log: Access denied with 403. Pattern matches form bypass Which of the following technologies was
MOST likely being used to generate this log?
Which of the following would be the BEST place to start?
An administrator would like to review the effectiveness of existing security in the enterprise. Which of the
following would be the BEST place to start?