1.drag drop
Drag and drop question. Drag the items to the proper locations.
Correct Answers:
2.drag drop
Drag and drop question. Drag the items to the proper locations.
Correct Answers:
3.What is the primary method of mitigating port redirection attacks?
A: keep firewalls up to date with the latest patches and fixes
B: do not allow trust models
C: keep OS and applications up to date with the latest patches and fixes
D: use proper trust models
Correct Answers: D
4.How are password attacks mitigated in the SAFE SMR midsize network design corporate Internet module?
A: filtering at the ISP, edge router, and corporate firewall
B: RFC 2827 and 1918 filtering at ISP edge and midsize network edge router
C: e-mail content filtering, HIDS, and host-based virus scanning
D: OS and IDS detection
E: CAR at the ISP edge and TCP setup controls at the firewall
Correct Answers: D
5.What method helps mitigate the threat of IP spoofing?
A: access control
B: logging
C: SNMP polling
D: Layer 2 switching
Correct Answers: A
6.Why are all providers of Internet connectivity urged to implement the filtering described in RFC 2827?
A: to prohibit attackers from using source addresses that reside within a range of legitimately advertised prefixes
B: to prohibit attackers from using forged source addresses that do not reside within a range of legitimately advertised prefixes
C: to filter Java applications that come from a source that is not trusted
D: to stop internal users from reaching web sites that violate the established security policy
Correct Answers: B
7.What are three steps of the Security Wheel? Choose three.
A:improve
B:log
C:maintain
D:test
E:secure
F:report
Correct Answers: A, D, E
8.How are port redirection attacks mitigated in the SAFE SMR small network campus module?
A: switched infrastructure
B: host based virus scanning
C: the use of NIDS and application access control
D: the latest security fixes and NIDS
E: private VLANs
F: HIDS
Correct Answers: F
9.Which commands are used for basic filtering in the SAFE SMR small network campus module? Choose two.
A:access-group
B:ip inspect-name
C:ip route
D:access-list
Correct Answers: A, D
10.Which is a key server found in SAFE Enterprise network design edge corporate internet module?
A: database server
B: application server
C: URL filtering server
D: proxy server
Correct Answers: C
版权与免责声明
1、本站所发布的文章仅供技术交流参考,本站不主张将其做为决策的依据,浏览者可自愿选择采信与否,本站不对因采信这些信息所产生的任何问题负责。
2、本站部分文章来源于网络,其版权为原权利人所有。由于来源之故,有的文章未能获得作者姓名,署“未知”或“佚名”。对于这些文章,有知悉作者姓名的请告知本站,以便及时署名。如果作者要求删除,我们将予以删除。除此之外本站不再承担其它责任。
3、本站部分文章来源于本站原创,本站拥有所有权利。
4、如对本站发布的信息有异议,请联系我们,经本站确认后,将在三个工作日内做出修改或删除处理。
请参阅权责声明!