What is the minimum number of network connections in a multihomed firewall?
What is the minimum number of network connections in a multihomed firewall?A . 3B . 5C . 4D . 2View AnswerAnswer: A
This proves that CompanyXYZ’s email gateway doesn’t prevent what?
CompanyXYZ has asked you to assess the security of their perimeter email gateway. From your office in New York, you craft a specially formatted email message and send it across the Internet to an employee of CompanyXYZ. The employee of CompanyXYZ is aware of your test. Your email message looks...
Which of the following is the BEST way to defend against network sniffing?
Which of the following is the BEST way to defend against network sniffing?A . Using encryption protocols to secure network communicationsB . Register all machines MAC Address in a Centralized DatabaseC . Use Static IP AddressD . Restrict Physical Access to Server Rooms hosting Critical ServersView AnswerAnswer: A Explanation: https://en.wikipedia.org/wiki/Sniffing_attack...
PGP, SSL, and IKE are all examples of which type of cryptography?
PGP, SSL, and IKE are all examples of which type of cryptography?A . DigestB . Secret KeyC . Public KeyD . Hash AlgorithmView AnswerAnswer: C
What is the most likely cause?
An incident investigator asks to receive a copy of the event logs from all firewalls, proxy servers, and Intrusion Detection Systems (IDS) on the network of an organization that has experienced a possible breach of security. When the investigator attempts to correlate the information in all of the logs, the...
Identify the UDP port that Network Time Protocol (NTP) uses as its primary means of communication?
Identify the UDP port that Network Time Protocol (NTP) uses as its primary means of communication?A . 113B . 69C . 123D . 161View AnswerAnswer: C Explanation: https://en.wikipedia.org/wiki/Network_Time_Protocol The Network Time Protocol (NTP) is a networking protocol for clock synchronization between computer systems over packet-switched, variable-latency data networks. NTP is...
What is the way to decide how a packet will move from an untrusted outside host to a protected inside that is behind a firewall, which permits the hacker to determine which ports are open and if the packets can pass through the packet-filtering of the firewall?
What is the way to decide how a packet will move from an untrusted outside host to a protected inside that is behind a firewall, which permits the hacker to determine which ports are open and if the packets can pass through the packet-filtering of the firewall?A . Session hijackingB...
What is the purpose of a demilitarized zone on a network?
What is the purpose of a demilitarized zone on a network?A . To scan all traffic coming through the DMZ to the internal networkB . To only provide direct access to the nodes within the DMZ and protect the network behind itC . To provide a place to put the...
Steve, a scientist who works in a governmental security agency, developed a technological solution to identify people based on walking patterns and implemented this approach to a physical control access.
Steve, a scientist who works in a governmental security agency, developed a technological solution to identify people based on walking patterns and implemented this approach to a physical control access. A camera captures people walking and identifies the individuals using Steve’s approach. After that, people must approximate their RFID badges....
Which security feature on switchers leverages the DHCP snooping database to help prevent man-in-the-middle attacks?
DHCP snooping is a great solution to prevent rogue DHCP servers on your network. Which security feature on switchers leverages the DHCP snooping database to help prevent man-in-the-middle attacks?A . Spanning treeB . Dynamic ARP Inspection (DAI)C . Port securityD . Layer 2 Attack Prevention Protocol (LAPP)View AnswerAnswer: B Explanation:...