Lernkarten

Karten 398 Karten
Lernende 44 Lernende
Sprache English
Stufe Universität
Erstellt / Aktualisiert 21.02.2016 / 27.10.2021
Lizenzierung Keine Angabe
Weblink
Einbinden
0 Exakte Antworten 163 Text Antworten 235 Multiple Choice Antworten
Fenster schliessen

Sara, the security administrator, must configure the corporate firewall to allow all public IP addresses on the internal interface of the firewall to be translated to one public IP address on the external interface of the same firewall. Which of the following should Sara configure?

PAT

NAP

DNAT

NAC

Fenster schliessen

Which of the following devices is MOST likely being used when processing the following?

1 PERMIT IP ANY ANY EQ 80

2 DENY IP ANY ANY

Firewall

NIPS

Load balancer

URL filter

Fenster schliessen

The security administrator at ABC company received the following log information from an external party:

10:45:01 EST, SRC 10.4.3.7:3056, DST 8.4.2.1:80, ALERT, Directory traversal
10:45:02 EST, SRC 10.4.3.7:3057, DST 8.4.2.1:80, ALERT, Account brute force
10:45:03 EST, SRC 10.4.3.7:3058, DST 8.4.2.1:80, ALERT, Port scan

The external party is reporting attacks coming from abc-company.com. Which of the following is the reason the ABC company’s security administrator is unable to determine the origin of the attack?

 

A NIDS was used in place of a NIPS

The log is not in UTC

The external party uses a firewall

ABC company uses PAT

Fenster schliessen

Which of the following security devices can be replicated on a Linux based computer using IP tables to inspect and properly handle network based traffic?

Sniffer

Router

Firewall

Switch

Fenster schliessen

Which of the following firewall types inspects Ethernet traffic at the MOST levels of the OSI model?

Packet Filter Firewall

Stateful Firewall

Proxy Firewall

Application Firewall

Fenster schliessen

The Chief Information Security Officer (CISO) has mandated that all IT systems with credit card data be segregated from the main corporate network to prevent unauthorized access and that access to the IT systems should be logged. Which of the following would BEST meet the CISO’s requirements?

Sniffers

NIDS

Firewalls

Web proxies

Layer 2 switches

Fenster schliessen

Which of the following network design elements allows for many internal devices to share one public IP address?

DNAT

PAT

DNS

DMZ

Fenster schliessen

Which of the following is a best practice when securing a switch from physical access?

Disable unnecessary accounts

Print baseline configuration

Enable access lists

Disable unused ports