Your organization has added a hot site as shown in the following graphic. All firewalls should enforce the following requirements: Use only secure protocols for remote management Block cleartext web traffic Users in the hot site are unable to access websites in the Internet. The following table shows the current rules configured in Firewall 3. You’...
Maggie is a sales representative for a software company. While in a coffee shop, she uses her laptop to connect to the public Wi-Fi, check her work emails, and upload details of a recent sale. Which of the following would she use to prevent other devices on the public network from accessing her laptop? (Choose the BEST two choices.) TPM HSM Firewal...
Your organization wants to combine some of the security controls used to control incoming and outgoing network traffic. At a minimum, the solution should include stateless inspection, malware inspection, and a content filter. Which of…
Administrators are deploying a new Linux server in the screened subnet. After it is installed, they want to manage it from their desktop computers located within the organization’s private network. Which of the following would be the BEST choice to meet this need? Forward…
Attackers have recently launched several attacks against servers in your organization’s screened subnet. You are tasked with identifying a solution that will have the best chance at preventing these attacks in the future. Which of the following is…
Share This Book 📚
Ready to highlight and find good content?
Glasp is a social web highlighter that people can highlight and organize quotes and thoughts from the web, and access other like-minded people’s learning.