An administrator wants to install a patch to an application.

An administrator wants to install a patch to an application. Given the scenario, download, verify and install thepatch in the most secure manner.Instructions: The last install that is completed will be the final submission. Answer: See the explanation Explanation:In this case the second link should be used (This may vary in actual exam). The first […]

Read More

Compliance with company policy requires a quarterly review of firewall rules.

Compliance with company policy requires a quarterly review of firewall rules. A new administrator is asked toconduct this review on the internal firewall sitting between several Internal networks. The intent of this firewall isto make traffic more restrictive. Given the following information answer the questions below:User Subnet: 192.168.1.0/24 Server Subnet: 192.168.2.0/24 Finance Subnet:192.168.3.0/24Instructions: To perform […]

Read More

There are requirements to segregate development and test infrastructure

A manufacturer is planning to build a segregated network. There are requirements to segregate developmentand test infrastructure from production and the need to support multiple entry points into the network dependingon the service being accessed. There are also strict rules in place to only permit user access from within thesame zone. Currently, the following access […]

Read More

which of the following type of calculations is needed?

A well-known retailer has experienced a massive credit card breach. The retailer had gone through an auditand had been presented with a potential problem on their network. Vendors were authenticating directly to theretailer’s AD servers, and an improper firewall rule allowed pivoting from the AD server to the DMZ where creditcard servers were kept. The […]

Read More

Which of the following meets these requirements?

A small company is developing a new Internet-facing web application. The security requirements are:1. Users of the web application must be uniquely identified and authenticated.2. Users of the web application will not be added to the company’s directory services.3. Passwords must not be stored in the code.Which of the following meets these requirements? A. Use […]

Read More