What TCP/IP layer does a packet filtering firewall work on?

John wants to implement a packet filtering firewall in his organization's network. What TCP/IP layer does a packet filtering firewall work on?A . Application layer B. Network Interface layer C. TCP layer D. IP layerView AnswerAnswer: D

May 20, 2023 No Comments READ MORE +

Choose the correct order of steps to analyze the attack surface.

Choose the correct order of steps to analyze the attack surface.A . Identify the indicators of exposure->visualize the attack surface->simulate the attack->reduce the attack surface B. Visualize the attack surface->simulate the attack->identify the indicators of exposure->reduce the attack surface C. Identify the indicators of exposure->simulate the attack->visualize the attack surface->reduce...

May 20, 2023 No Comments READ MORE +

Which type of attack is James analyzing?

James was inspecting ARP packets in his organization's network traffic with the help of Wireshark. He is checking the volume of traffic containing ARP requests as well as the source IP address from which they are originating. Which type of attack is James analyzing?A . ARP Sweep B. ARP misconfiguration...

May 19, 2023 No Comments READ MORE +

George was conducting a recovery drill test as a part of his network operation. Recovery drill tests are conducted on the______________.

George was conducting a recovery drill test as a part of his network operation. Recovery drill tests are conducted on the______________.A . Archived data B. Deleted data C. Data in transit D. Backup dataView AnswerAnswer: D

May 19, 2023 No Comments READ MORE +

Which of the following storage technologies best suits Tom's requirements?

Tom works as a network administrator in a multinational organization having branches across North America and Europe. Tom wants to implement a storage technology that can provide centralized data storage and provide free data backup on the server. He should be able to perform data backup and recovery more efficiently...

May 18, 2023 No Comments READ MORE +

Sean has built a site-to-site VPN architecture between the head office and the branch office of his company. When users in the branch office and head office try to communicate with each other, the traffic is encapsulated. As the traffic passes though the gateway, it is encapsulated again. The header and payload both are encapsulated. This second encapsulation occurs only in the __________implementation of a VPN.

Sean has built a site-to-site VPN architecture between the head office and the branch office of his company. When users in the branch office and head office try to communicate with each other, the traffic is encapsulated. As the traffic passes though the gateway, it is encapsulated again. The header...

May 18, 2023 No Comments READ MORE +

Which of the following countermeasure(s) should be added to deal with future malware incidents?

The IR team and the network administrator have successfully handled a malware incident on the network. The team is now preparing countermeasure guideline to avoid a future occurrence of the malware incident. Which of the following countermeasure(s) should be added to deal with future malware incidents? (Select all that apply)A...

May 18, 2023 No Comments READ MORE +

How should this risk be categorized in the risk matrix?

The risk assessment team in Southern California has estimated that the probability of an incident that has potential to impact almost 80% of the bank's business is very high. How should this risk be categorized in the risk matrix?A . High B. Medium C. Extreme D. LowView AnswerAnswer: C

May 17, 2023 No Comments READ MORE +

Which of the following password cracking techniques is the attacker trying?

An attacker uses different types of password cracking techniques to crack the password and gain unauthorized access to a system. An attacker uses a file containing a list of commonly used passwords. They then upload this file into the cracking application that runs against the user accounts. Which of the...

May 17, 2023 No Comments READ MORE +

If there is a fire incident caused by an electrical appliance short-circuit, which fire suppressant should be used to control it?

If there is a fire incident caused by an electrical appliance short-circuit, which fire suppressant should be used to control it?A . Water B. Wet chemical C. Dry chemical D. Raw chemicalView AnswerAnswer: C

May 17, 2023 No Comments READ MORE +