What is the purpose of a demilitarized zone on a network?
A.
To scan all traffic coming through the DMZ to the internal network
B.
To only provide direct access to the nodes within the DMZ and protect the network behind it
C.
To provide a place to put the honeypot
D.
To contain the network devices you wish to protect
To only provide direct access to the nodes within the DMZ and protect the network behind it
Based on the following extract from the log of a compromised machine, what is the hacker really trying to steal?
A.
har.txt
B.
SAM file
C.
wwwroot
D.
Repair file
SAM file
Which of the following is the BEST way to defend against network sniffing?
A.
Using encryption protocols to secure network communications
B.
Register all machines MAC Address in a Centralized Database
C.
Use Static IP Address
D.
Restrict Physical Access to Server Rooms hosting Critical Servers
Using encryption protocols to secure network communications
During an Xmas scan what indicates a port is closed?
A.
No return response
B.
RST
C.
ACK
D.
SYN
RST
A regional bank hires your company to perform a security assessment on their network
after a recent data breach. The attacker was able to steal financial data from the bank by
compromising only a single server. Based on this information, what should be one of your
key recommendations to the bank?
A.
Place a front-end web server in a demilitarized zone that only handles external web traffic
B.
Require all employees to change their anti-virus program with a new one
C.
Move the financial data to another server on the same IP subnet
D.
Issue new certificates to the web servers from the root certificate authority
Place a front-end web server in a demilitarized zone that only handles external web traffic
Page 21 out of 104 Pages |
Previous |