How can a WAF validate traffic before it reaches a web application?
How can a WAF validate traffic before it reaches a web application?A . It uses a role-based filtering technique B. It uses an access-based filtering technique C. It uses a sandboxing filtering technique D. It uses a rule-based filtering techniqueView AnswerAnswer: D
Which of the following VPN topologies establishes a persistent connection between an organization's main office and its branch offices using a third-party network or the Internet?
Which of the following VPN topologies establishes a persistent connection between an organization's main office and its branch offices using a third-party network or the Internet?A . Star B. Point-to-Point C. Full Mesh D. Hub-and-SpokeView AnswerAnswer: D
Which type of firewall service is John thinking of implementing?
John wants to implement a firewall service that works at the session layer of the OSI model. The firewall must also have the ability to hide the private network information. Which type of firewall service is John thinking of implementing?A . Application level gateway B. Circuit level gateway C. Stateful...
Syslog and SNMP are the two main _______ protocols through which log records are transferred.
Syslog and SNMP are the two main _______ protocols through which log records are transferred.A . Pull-based B. Push-based C. Host-based D. Network-basedView AnswerAnswer: B
Under which category of an information security policy does AUP fall into?
Assume that you are a network administrator and the company has asked you to draft an Acceptable Use Policy (AUP) for employees. Under which category of an information security policy does AUP fall into?A . System Specific Security Policy (SSSP) B. Incident Response Policy (IRP) C. Enterprise Information Security Policy...
How is application whitelisting different from application blacklisting?
How is application whitelisting different from application blacklisting?A . It allows all applications other than the undesirable applications B. It allows execution of trusted applications in a unified environment C. It allows execution of untrusted applications in an isolated environment D. It rejects all applications other than the allowed applicationsView...
What encryption method did Ivan settle on?
Ivan needs to pick an encryption method that is scalable even though it might be slower. He has settled on a method that works where one key is public and the other is private. What encryption method did Ivan settle on?A . Ivan settled on the private encryption method. B....
The--------------protocol works in the network layer and is responsible for handling the error codes during the delivery of packets. This protocol is also responsible for providing communication in the TCP/IP stack.
The--------------protocol works in the network layer and is responsible for handling the error codes during the delivery of packets. This protocol is also responsible for providing communication in the TCP/IP stack.A . RARP B. ICMP C. DHCP D. ARPView AnswerAnswer: B
What built-in Windows feature could you have implemented to protect the sensitive information on these laptops?
You are responsible for network functions and logical security throughout the corporation. Your company has over 250 servers running Windows Server 2012, 5000 workstations running Windows 10, and 200 mobile users working from laptops on Windows 8. Last week 10 of your company's laptops were stolen from a salesman, while...
What type of scan is Cindy attempting here?
Cindy is the network security administrator for her company. She just got back from a security conference in Las Vegas where they talked about all kinds of old and new security threats; many of which she did not know of. She is worried about the current security state of her...