IT staff within a company often conduct remote desktop sharing sessions with vendors to troubleshoot vendorproduct-related issues. Drag and drop the following security controls to match the associated security concern.Options may be used once or not at all.Select and Place: Answer: Show Answer
An organization is implementing a project to simplify the management of its firewall network flows andimplement security controls. The following requirements exist. Drag and drop the BEST security solution tomeet the given requirements. Options may be used once or not at all. All placeholders must be filled.Select and Place: Answer: Show Answer
Company A has noticed abnormal behavior targeting their SQL server on the network from a rogue IP address.
Company A has noticed abnormal behavior targeting their SQL server on the network from a rogue IP address.The company uses the following internal IP address ranges: 18.104.22.168/24 for the corporate site and22.214.171.124/24 for the remote site. The Telco router interface uses the 126.96.36.199/30 IP range.Instructions: Click on the simulation button to refer to the Network […]
An administrator wants to install a patch to an application. Given the scenario, download, verify and install thepatch in the most secure manner.Instructions: The last install that is completed will be the final submission. Answer: See the explanation Explanation:In this case the second link should be used (This may vary in actual exam). The first […]
Compliance with company policy requires a quarterly review of firewall rules. A new administrator is asked toconduct this review on the internal firewall sitting between several Internal networks. The intent of this firewall isto make traffic more restrictive. Given the following information answer the questions below:User Subnet: 192.168.1.0/24 Server Subnet: 192.168.2.0/24 Finance Subnet:192.168.3.0/24Instructions: To perform […]
Company A has experienced external attacks on their network and wants to minimize the attacks fromreoccurring. Modify the network diagram to prevent SQL injections, XSS attacks, smurf attacks, e-mail spam,downloaded malware, viruses and ping attacks. The company can spend a MAXIMUM of $50,000 USD. A costlist for each item is listed below:1. Anti-Virus Server – […]
A manufacturer is planning to build a segregated network. There are requirements to segregate developmentand test infrastructure from production and the need to support multiple entry points into the network dependingon the service being accessed. There are also strict rules in place to only permit user access from within thesame zone. Currently, the following access […]
A well-known retailer has experienced a massive credit card breach. The retailer had gone through an auditand had been presented with a potential problem on their network. Vendors were authenticating directly to theretailer’s AD servers, and an improper firewall rule allowed pivoting from the AD server to the DMZ where creditcard servers were kept. The […]
A small company is developing a new Internet-facing web application. The security requirements are:1. Users of the web application must be uniquely identified and authenticated.2. Users of the web application will not be added to the company’s directory services.3. Passwords must not be stored in the code.Which of the following meets these requirements? A. Use […]
Which of the following components should be used to achieve the design in conjunction with directory services?
An educational institution would like to make computer labs available to remote students. The labs are used forvarious IT networking, security, and programming courses. The requirements are:1. Each lab must be on a separate network segment.2. Labs must have access to the Internet, but not other lab networks.3. Student devices must have network access, not […]