What is the minimum number of network connections in a multihomed firewall?
What is the minimum number of network connections in a multihomed firewall?A . 3 B. 5 C. 4 D. 2View AnswerAnswer: A
Which DNS resource record can indicate how long any "DNS poisoning" could last?
Which DNS resource record can indicate how long any "DNS poisoning" could last?A . MX B. SOA C. NS D. TIMEOUTView AnswerAnswer: B
What is the closest approximate cost of this replacement and recovery operation per year?
The change of a hard drive failure is once every three years. The cost to buy a new hard drive is $300. It will require 10 hours to restore the OS and software to the new hard disk. It will require a further 4 hours to restore the database from...
Which mode of IPSec should you use to assure security and confidentiality of data within the same LAN?
Which mode of IPSec should you use to assure security and confidentiality of data within the same LAN?A . ESP transport mode B. ESP confidential C. AH permiscuous D. AH Tunnel modeView AnswerAnswer: A
How did the attacker accomplish this hack?
Joseph was the Web site administrator for the Mason Insurance in New York, who's main Web site was located at www.masonins.com. Joseph uses his laptop computer regularly to administer the Web site. One night, Joseph received an urgent phone call from his friend, Smith. According to Smith, the main Mason...
What may be the problem?
You are the Network Admin, and you get a complaint that some of the websites are no longer accessible. You try to ping the servers and find them to be reachable. Then you type the IP address and then you try on the browser, and find it to be accessible....
Although FTP traffic is not encrypted by default, which layer 3 protocol would allow for end-to-end encryption of the connection?
Although FTP traffic is not encrypted by default, which layer 3 protocol would allow for end-to-end encryption of the connection?A . SFTP B. Ipsec C. SSL D. FTPSView AnswerAnswer: B Explanation: https://en.wikipedia.org/wiki/IPsec Internet Protocol Security (IPsec) is a secure network protocol suite that authenticates and encrypts the packets of data...
Study the snort rule given below:
Study the snort rule given below: From the options below, choose the exploit against which this rule applies.A . WebDav B. SQL Slammer C. MS Blaster D. MyDoomView AnswerAnswer: C
What may be the problem?
You are the Network Admin, and you get a complaint that some of the websites are no longer accessible. You try to ping the servers and find them to be reachable. Then you type the IP address and then you try on the browser, and find it to be accessible....
What may be the problem?
You are the Network Admin, and you get a complaint that some of the websites are no longer accessible. You try to ping the servers and find them to be reachable. Then you type the IP address and then you try on the browser, and find it to be accessible....