Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

Which of the following is most likely to address a problem with an operating system's ability to withstand an attack that attempts to exploit a buffer overflow?

A.

Firewall

B.

Software update

C.

Intrusion detection system

D.

Network scanner

What is the primary drawback of using symmetric-key encryption?

A.

Key transport across a network

B.

Speed of encryption

C.

Denial-of-service attacks

D.

Inability to support convergence traffic

Consider the following diagram involving two firewall-protected networks:

Which of the following is necessary for each of the firewalls to allow private IP addresses to be passed on to the Internet?

A.

Chargeback

B.

Stateful multi-layer inspection

C.

Masquerading

D.

DMZ creation

A new video conferencing device has been installed on the network. You have been assigned to troubleshoot a connectivity problem between remote workers and the central company. Specifically, remote workers are having problems making any connection at all. Which technique will most likely help you solve this problem while retaining the existing level of security at the firewall?

A.

Deny all use of UDP above Port 1024.

B.

Configure the firewall to provide VPN access.

C.

Configure a second network connection directly to the video conferencing device.

D.

Allow all use of UDP below Port 1024.

Which of the following organizations provides regular updates concerning security breaches and issues?

A.

IETF

B.

ISO

C.

ICANN

D.

CERT

An application is creating hashes of each file on an attached storage device. Which of the following will typically occur during this process?

A.

An increase in the amount of time it takes for the system to respond to requests

B.

Reduced risk of an attack

C.

Increased risk of an attack

D.

A reduction in the amount of time it takes for the system to respond to requests

Which of the following activities is the most effective at keeping the actions of nae end users from putting the company's physical and logicalWhich of the following activities is the most effective at keeping the actions of na?e end users from putting the company's physical and logical resources at risk?

A.

Configuring network intrusion-detection software to monitor end user activity

B.

Conducting a training session at the time of hire

C.

Reconfiguring the network firewall

D.

Assembling a team of security professionals to monitor the network

Consider the following series of commands from a Linux system: iptables -A input -p icmp -s 0/0 -d 0/0 -j REJECT Which explanation best describes the impact of the resulting firewall ruleset?

A.

Individuals on remote networks will no longer be able to use SSH to control internal network resources.

B.

Internal hosts will not be able to ping each other using ICMP.

C.

Stateful multi-layer inspection has been enabled.

D.

Individuals on remote networks will not be able to use ping to troubleshoot connections.