Harry has sued the company claiming they made his personal information public on a social networking site in the United States. The company denies the allegations and consulted a/an _______ for legal advice to defend them against this allegation.

Harry has sued the company claiming they made his personal information public on a social networking site in the United States. The company denies the allegations and consulted a/an _______ for legal advice to defend them against this allegation.A . Evidence Manager B. Incident Handler C. Attorney D. PR SpecialistView...

May 26, 2023 No Comments READ MORE +

What layer of the OSI model do IPsec tunnels function on?

Liza was told by her network administrator that they will be implementing IPsec VPN tunnels to connect the branch locations to the main office. What layer of the OSI model do IPsec tunnels function on?A . The data link layer B. The session layer C. The network layer D. The...

May 26, 2023 No Comments READ MORE +

Which of the following command allows Sophie to do so?

Sophie has been working as a Windows network administrator at an MNC over the past 7 years. She wants to check whether SMB1 is enabled or disabled. Which of the following command allows Sophie to do so?A . Get-WindowsOptionalFeatures -Online -FeatureNames SMB1Protocol B. Get-WindowsOptionalFeature -Online -FeatureName SMB1Protocol C. Get-WindowsOptionalFeature -Online...

May 26, 2023 No Comments READ MORE +

Michael decides to view the-----------------to track employee actions on the organization's network.

Michael decides to view the-----------------to track employee actions on the organization's network.A . Firewall policy B. Firewall log C. Firewall settings D. Firewall rule setView AnswerAnswer: B

May 25, 2023 No Comments READ MORE +

What type of network security approach is Daniel adopting?

Daniel is monitoring network traffic with the help of a network monitoring tool to detect any abnormalities. What type of network security approach is Daniel adopting?A . Preventative B. Reactive C. Retrospective D. Defense-in-depthView AnswerAnswer: B

May 25, 2023 No Comments READ MORE +

Fargo would like to eliminate it; what command should he execute?

Fargo, head of network defense at Globadyne Tech, has discovered an undesirable process in several Linux systems, which causes machines to hang every 1 hour. Fargo would like to eliminate it; what command should he execute?A . # update-rc.d -f [service name] remove B. # service [service name] stop C....

May 25, 2023 No Comments READ MORE +

What layer of network defense-in-depth strategy is he trying to follow?

Damian is the chief security officer of Enigma Electronics. To block intruders and prevent any environmental accidents, he needs to set a two-factor authenticated keypad lock at the entrance, rig a fire suppression system, and link any video cameras at various corridors to view the feeds in the surveillance room....

May 25, 2023 No Comments READ MORE +

Which command will John use to enable NetFlow on an interface?

John, the network administrator and he wants to enable the NetFlow feature in Cisco routers to collect and monitor the IP network traffic passing through the router. Which command will John use to enable NetFlow on an interface?A . Router(Config-if) # IP route - cache flow B. Router# Netmon enable...

May 25, 2023 No Comments READ MORE +

How can a WAF validate traffic before it reaches a web application?

How can a WAF validate traffic before it reaches a web application?A . It uses a role-based filtering technique B. It uses an access-based filtering technique C. It uses a sandboxing filtering technique D. It uses a rule-based filtering techniqueView AnswerAnswer: D

May 25, 2023 No Comments READ MORE +

Which of the following VPN topologies establishes a persistent connection between an organization's main office and its branch offices using a third-party network or the Internet?

Which of the following VPN topologies establishes a persistent connection between an organization's main office and its branch offices using a third-party network or the Internet?A . Star B. Point-to-Point C. Full Mesh D. Hub-and-SpokeView AnswerAnswer: D

May 25, 2023 No Comments READ MORE +