<< Prev Question Next Question >>

Question 4/64

A company recently added a DR site and is redesigning the network. Users at the DR site are having issues browsing websites.
INSTRUCTIONS
Click on each firewall to do the following:
Deny cleartext web traffic.
Ensure secure management protocols are used. Please Resolve issues at the DR site.
The ruleset order cannot be modified due to outside constraints.
If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.


LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (64q)
1 commentQuestion 1: Multiple business accounts were compromised a few days after...
Question 2: A company is auditing the manner in which its European custo...
Question 3: Which of the following control Types would be BEST to use in...
Question 4: A company recently added a DR site and is redesigning the ne...
Question 5: Which of the following prevents an employee from seeing a co...
Question 6: A security analyst generated a file named host1.pcap and sha...
1 commentQuestion 7: Which of the following is a reason to publish files' hashes?...
Question 8: A security incident has been resolved Which of the following...
3 commentQuestion 9: A security engineer is deploying a new wireless for a compan...
2 commentQuestion 10: Which of the following is a policy that provides a greater d...
Question 11: Business partners are working on a secunty mechanism lo vali...
Question 12: Due to unexpected circumstances, an IT company must vacate i...
Question 13: Several universities are participating m a collaborative res...
Question 14: An organization is planning lo open other data centers to su...
Question 15: A user is attempting to navigate to a website from inside th...
Question 16: A security analyst was asked to evaluate a potential attack ...
Question 17: Which of the following would detect intrusions at the perime...
Question 18: Which of the following are common VoIP-associated vulnerabil...
Question 19: DDoS attacks are causing an overload on the cluster of cloud...
Question 20: Which of the following would be the BEST way to analyze disk...
Question 21: The Chief Information Security Officer (CISO) of a bank rece...
Question 22: A junior security analyst iss conducting an analysis after p...
Question 23: An engineer recently deployed a group of 100 web servers in ...
Question 24: A forensic analyst needs to prove that data has not been tam...
Question 25: A security analyst wants to fingerpnnt a web server Which of...
Question 26: An organization wants to implement a biometric system with t...
Question 27: A security analyst is tasked with defining the "something yo...
Question 28: A systems administrator needs to install a new wireless netw...
Question 29: A security policy states that common words should not be use...
Question 30: A news article states hackers have been selling access to Io...
Question 31: A company is moving its retail website to a public cloud pro...
Question 32: A security proposal was set up to track requests for remote ...
Question 33: A database administrator wants to grant access to an applica...
Question 34: Security analysts notice a server login from a user who has ...
Question 35: A company wants to improve end users experiences when they t...
Question 36: A security analyst needs to be able to search and correlate ...
Question 37: An attacker replaces a digitally signed document with anothe...
Question 38: Certain users are reporting their accounts are being used to...
Question 39: A SOC operator is analyzing a log file that contains the fol...
Question 40: A forensics investigator is examining a number of unauthoriz...
Question 41: A company is looking to migrate some servers to the cloud to...
Question 42: Which of the following would be indicative of a hidden audio...
Question 43: A company is receiving emails with links to phishing sites t...
Question 44: A systems administrator reports degraded performance on a vi...
Question 45: Which of the following employee roles is responsible for pro...
Question 46: An organization has hired a ted team to simulate attacks on ...
Question 47: A technician was dispatched to complete repairs on a server ...
Question 48: A user enters a username and a password at the login screen ...
Question 49: Two organizations plan to collaborate on the evaluation of n...
Question 50: A tax organization is working on a solution to validate the ...
1 commentQuestion 51: A report delivered to the Chief Information Security Officer...
Question 52: A software company adopted the following processes before re...
Question 53: Which of the following is the MOST effective control against...
1 commentQuestion 54: A social media company based in North Amenca is looking to e...
Question 55: An employee received a word processing file that was deliver...
Question 56: An organization maintains several environments in which patc...
Question 57: Server administrators want to configure a cloud solution so ...
Question 58: A company's security team received notice of a critical vuln...
Question 59: The Chief Information Security Officer wants to prevent exfi...
Question 60: A company is providing security awareness training regarding...
Question 61: An incident has occurred in the production environment. Anal...
Question 62: A security engineer is building a file transfer solution to ...
Question 63: An ofgantzation has decided to purchase an insurance policy ...
Question 64: During a trial, a judge determined evidence gathered from a ...