What type of solution does Fred's boss want to implement?
Fred is a network technician working for Johnson Services, a temporary employment agency in Boston. Johnson Services has three remote offices in New England and the headquarters in Boston where Fred works. The company relies on a number of customized applications to perform daily tasks and unfortunately these applications require...
What type of security incident are the employees a victim of?
Eric is receiving complaints from employees that their systems are very slow and experiencing odd issues including restarting automatically and frequent system hangs. Upon investigating, he is convinced the systems are infected with a virus that forces systems to shut down automatically after period of time. What type of security...
What should Steven implement on the firewall to ensure this happens?
Steven's company has recently grown from 5 employees to over 50. Every workstation has a public IP address and navigated to the Internet with little to no protection. Steven wants to use a firewall. He also wants IP addresses to be private addresses, to prevent public Internet devices direct access...
What layer of the OSI model do IPsec tunnels function on?
Liza was told by her network administrator that they will be implementing IPsec VPN tunnels to connect the branch locations to the main office. What layer of the OSI model do IPsec tunnels function on?A . The data link layerB . The session layerC . The network layerD . The...
If a network is at risk from unskilled individuals, what type of threat is this?
If a network is at risk from unskilled individuals, what type of threat is this?A . External ThreatsB . Structured ThreatsC . Unstructured ThreatsD . Internal ThreatsView AnswerAnswer: C Explanation: Unstructured threats typically originate from individuals who lack advanced skills or a sophisticated understanding of network systems. These threats often...
What command is used to terminate certain processes in an Ubuntu system?
What command is used to terminate certain processes in an Ubuntu system?A . #grep Kill [Target Process}B . #kill-9[PID]C . #ps ax KillD . # netstat Kill [Target Process]View AnswerAnswer: B Explanation: In Ubuntu, to terminate a specific process, you would use the kill command followed by the signal you...
What logical area is Larry putting the new email server into?
Larry is responsible for the company's network consisting of 300 workstations and 25 servers. After using a hosted email service for a year, the company wants to control the email internally. Larry likes this idea because it will give him more control over the email. Larry wants to purchase a...
What type of scan is Cindy attempting here?
Cindy is the network security administrator for her company. She just got back from a security conference in Las Vegas where they talked about all kinds of old and new security threats; many of which she did not know of. She is worried about the current security state of her...
What type of solution would be best for Lyle?
Lyle is the IT director for a medium-sized food service supply company in Nebraska. Lyle's company employs over 300 workers, half of which use computers. He recently came back from a security training seminar on logical security. He now wants to ensure his company is as secure as possible. Lyle...
What should he do to effectively correlate all incidents that pass through these security controls?
Rick has implemented several firewalls and IDS systems across his enterprise network. What should he do to effectively correlate all incidents that pass through these security controls?A . Use firewalls in Network Address Transition (NAT) modeB . Implement IPsecC . Implement Simple Network Management Protocol (SNMP)D . Use Network Time...