PrepAway - Latest Free Exam Questions & Answers

Author: seenagape

Which built-in functionality of Linux can achieve this?

Jim’s organization has just completed a major Linux roll out and now all of the organization’s
systems are running the Linux 2.5 kernel. The roll out expenses has posed constraints on
purchasing other essential security equipment and software. The organization requires an option
to control network traffic and also perform stateful inspection of traffic going into and out of the
DMZ.
Which built-in functionality of Linux can achieve this?

How can she restrict this type of abuse by limiting access to only specific IP addresses that are trusted by u

Rebecca has noted multiple entries in her logs about users attempting to connect on ports that are
either not opened or ports that are not for public usage. How can she restrict this type of abuse by
limiting access to only specific IP addresses that are trusted by using one of the built-in Linux
Operating System tools?


Page 411 of 555« First...102030...409410411412413...420430440...Last »