Which task should you perform first when considering where to place equipment?
Which task should you perform first when considering where to place equipment?A . Conduct research to determine the appropriate products for your organization.B . Consult with management to determine specific needs.C . Secure funding.D . Conduct a needs assessment audit.View AnswerAnswer: D
The vast majority of hackers are which type of attacker?
The vast majority of hackers are which type of attacker?A . Casual attackerB . SpyC . Disgruntled employeeD . Determined attackerView AnswerAnswer: A
Which of the following security services, as defined by the ISO 7498-2 Security Architecture document, protects against active threats by verifying or maintaining the consistency of information?
Which of the following security services, as defined by the ISO 7498-2 Security Architecture document, protects against active threats by verifying or maintaining the consistency of information?A . Data confidentialityB . AuthenticationC . Non-repudiationD . Data integrityView AnswerAnswer: D
Which of the following techniques will best help reduce the severity of this attack?
A distributed denial-of-service (DDOS) attack has occurred where both ICMP and TCP packets have crashed the company's Web server. Which of the following techniques will best help reduce the severity of this attack?A . Filtering traffic at the firewallB . Changing your ISPC . Installing Apache Server rather than Microsoft...
Which of the following describes the practice of stateful multi-layer inspection?
Which of the following describes the practice of stateful multi-layer inspection?A . Using a VLAN on a firewall to enable masquerading of private IP addressesB . Prioritizing voice and video data to reduce congestionC . Inspecting packets in all layers of the OSI/RM with a packet filterD . Using Quality...
Why can instant messaging (IM) and peer-to-peer (P2P) applications be considered a threat to network security?
Why can instant messaging (IM) and peer-to-peer (P2P) applications be considered a threat to network security?A . Because they use ports above 1023 and many firewalls are not configured to block this trafficB . Because they are susceptible to VLAN hoppingC . Because they usually lie outside the broadcast domainD...
Considering physical security, which of the following should you look for when identifying a room that will act as a server room?
Considering physical security, which of the following should you look for when identifying a room that will act as a server room?A . Electrical outletsB . Power over Ethernet (PoE) settingsC . False ceilingsD . Space for backup serversView AnswerAnswer: C
Which technique will most likely help you solve this problem while retaining the existing level of security at the firewall?
A new video conferencing device has been installed on the network. You have been assigned to troubleshoot a connectivity problem between remote workers and the central company. Specifically, remote workers are having problems making any connection at all. Which technique will most likely help you solve this problem while retaining...
Which of the following is most likely to address a problem with an operating system's ability to withstand an attack that attempts to exploit a buffer overflow?
Which of the following is most likely to address a problem with an operating system's ability to withstand an attack that attempts to exploit a buffer overflow?A . FirewallB . Software updateC . Intrusion detection systemD . Network scannerView AnswerAnswer: B
At a minimum, what ports must you open in regards to the internal systems?
Your firewall is configured to forbid all internal traffic from going out to the Internet. You want to allow internal clients to access all Web traffic. At a minimum, what ports must you open in regards to the internal systems?A . TCP Port 80 and all ports above 1023B ....