<< Prev Question Next Question >>

Question 67/170

Larry is responsible for the company's network consisting of 300 workstations and 25 servers. After using a hosted email service for a year, the company wants to control the email internally. Larry likes this idea because it will give him more control over the email. Larry wants to purchase a server for email but does not want the server to be on the internal network due to the potential to cause security risks. He decides to place the server outside of the company's internal firewall. There is another firewall connected directly to the Internet that will protect traffic from accessing the email server. The server will be placed between the two firewalls. What logical area is Larry putting the new email server into?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (170q)
Question 1: Which of the following is not part of the recommended first ...
Question 2: Bryson is the IT manager and sole IT employee working for a ...
Question 3: Who acts as an intermediary to provide connectivity and tran...
Question 4: Which phase of vulnerability management deals with the actio...
Question 5: Which of the following things need to be identified during a...
Question 6: Daniel works as a network administrator in an Information Se...
Question 7: Which of the following Layers of IoT Architecture provides d...
Question 8: In _______ mechanism, the system or application sends log re...
Question 9: Emmanuel works as a Windows system administrator at an MNC. ...
Question 10: Malone is finishing up his incident handling plan for IT bef...
Question 11: Identify the network topology where each computer acts as a ...
Question 12: John is a senior network security administrator working at a...
Question 13: Which of the following Wireshark filters allows an administr...
Question 14: Docker provides Platforms-a-Service (PaaS) through _________...
Question 15: On which layer of the OSI model does the packet filtering fi...
Question 16: Which of the following is consumed into SIEM solutions to ta...
Question 17: Which of the following security models enable strict identit...
Question 18: Which RAID level does not provide data redundancy?...
Question 19: How is the chip-level security of an loT device achieved?...
Question 20: Which of the following network security protocols protects f...
Question 21: Which of the following can be used to suppress fire from Cla...
Question 22: Harry has sued the company claiming they made his personal i...
Question 23: In Public Key Infrastructure (PKI), which authority is respo...
Question 24: Hacktivists are threat actors, who can be described as -----...
Question 25: Simon had all his systems administrators implement hardware ...
Question 26: Patrick wants to change the file permission of a file with p...
Question 27: James is working as a Network Administrator in a reputed com...
Question 28: Who oversees all the incident response activities in an orga...
Question 29: Harry has sued the company claiming they made his personal i...
Question 30: Under which of the following acts can an international finan...
Question 31: Jeanne is working as a network administrator in an IT compan...
Question 32: Frank installed Wireshark at all ingress points in the netwo...
Question 33: Which of the following DDoS attacks overloads a service by s...
Question 34: Delta IT solutions suffered a substantial data loss translat...
Question 35: David, a network and system admin, encrypted all the files i...
Question 36: Which of the following filters can be used to detect UDP sca...
Question 37: Justine has been tasked by her supervisor to ensure that the...
Question 38: Identify the correct statements regarding a DMZ zone:...
Question 39: The GMT enterprise is working on their internet and web usag...
Question 40: Simran is a network administrator at a start-up called Revol...
Question 41: You are monitoring your network traffic with the Wireshark u...
Question 42: An IT company has just been hit with a severe external secur...
Question 43: Which of the following helps in viewing account activity and...
Question 44: Chris is a senior network administrator. Chris wants to meas...
Question 45: Which of the following incident handling stage removes the r...
Question 46: Which among the following filter is used to detect a SYN/FIN...
Question 47: Kyle, a front office executive, suspects that a Trojan has i...
Question 48: During the recovery process, RTO and RPO should be the main ...
Question 49: What is the name of the authority that verifies the certific...
Question 50: To provide optimum security while enabling safe/necessary se...
Question 51: Who is an IR custodian?
Question 52: Which subdirectory in /var/log directory stores information ...
Question 53: You are tasked to perform black hat vulnerability assessment...
Question 54: A network designer needs to submit a proposal for a company,...
Question 55: Which of the following examines Recovery Point Objectives (R...
Question 56: Identify the password cracking attempt involving precomputed...
Question 57: The network admin decides to assign a class B IP address to ...
Question 58: Which of the following interfaces uses hot plugging techniqu...
Question 59: Which of the following is NOT an AWS Shared Responsibility M...
Question 60: Disaster Recovery is a _________....
Question 61: Identify the network topology in which the network devices a...
Question 62: Sophie has been working as a Windows network administrator a...
Question 63: John has been working a* a network administrator at an IT co...
Question 64: Michelle is a network security administrator working in an M...
Question 65: Identify the virtualization level that creates a massive poo...
Question 66: An administrator wants to monitor and inspect large amounts ...
Question 67: Larry is responsible for the company's network consisting of...
Question 68: Paul is a network security technician working on a contract ...
Question 69: Will is working as a Network Administrator. Management wants...
Question 70: As a network administrator, you have implemented WPA2 encryp...
Question 71: A network is setup using an IP address range of 0.0.0.0 to 1...
Question 72: What represents the ability of an organization to respond un...
Question 73: Identify the type of event that is recorded when an applicat...
Question 74: The company has implemented a backup plan. James is working ...
Question 75: Identify the minimum number of drives required to setup RAID...
Question 76: Match the following NIST security life cycle components with...
Question 77: You are using Wireshark to monitor your network traffic and ...
Question 78: Which type of firewall consists of three interfaces and allo...
Question 79: Mark is monitoring the network traffic on his organization's...
Question 80: Which encryption algorithm is used by WPA3 encryption?...
Question 81: What command is used to terminate certain processes in an Ub...
Question 82: In MacOS, how can the user implement disk encryption?...
Question 83: What is Azure Key Vault?
Question 84: Alex is administrating the firewall in the organization's ne...
Question 85: A network administrator is monitoring the network traffic wi...
Question 86: The IR team and the network administrator have successfully ...
Question 87: An organization's web server was recently compromised trigge...
Question 88: Which of the following NIST incident category includes any a...
Question 89: Which of the following provides the target for designing DR ...
Question 90: Cindy is the network security administrator for her company....
Question 91: Kelly is taking backups of the organization's dat a. Current...
Question 92: Which scan attempt can penetrate through a router and a fire...
Question 93: Michael decides to view the-----------------to track employe...
Question 94: Which of the following types of information can be obtained ...
Question 95: Which of the following is a best practice for wireless netwo...
Question 96: Daniel is giving training on designing and implementing a se...
Question 97: Albert works as a Windows system administrator at an MNC. He...
Question 98: In what type of IoT communication model do devices interact ...
Question 99: Management wants to calculate the risk factor for their orga...
Question 100: Which of the following systems includes an independent NAS H...
Question 101: Which antenna's characteristic refer to the calculation of r...
Question 102: Rick has implemented several firewalls and IDS systems acros...
Question 103: Which of the following statement holds true in terms of cont...
Question 104: Which of the following type of UPS is used to supply power a...
Question 105: Timothy works as a network administrator in a multinational ...
Question 106: Which of the following is an example of Indicators of Attack...
Question 107: A local bank wants to protect their cardholder dat a. Which ...
Question 108: Jorge has developed a core program for a mobile application ...
Question 109: Sam, a network administrator is using Wireshark to monitor t...
Question 110: What is composite signature-based analysis?...
Question 111: James wants to implement certain control measures to prevent...
Question 112: Which of the following technologies can be used to leverage ...
Question 113: Nancy is working as a network administrator for a small comp...
Question 114: John wants to implement a packet filtering firewall in his o...
Question 115: Which authorization lets users access a requested resource o...
Question 116: An attacker has access to password hashes of a Windows 7 com...
Question 117: An IDS or IDPS can be deployed in two modes. Which deploymen...
Question 118: Maximus Tech Is a multinational company that uses Cisco ASA ...
Question 119: Consider a scenario consisting of a tree network. The root N...
Question 120: Which firewall can a network administrator use for better ba...
Question 121: Which biometric technique authenticates people by analyzing ...
Question 122: Management decides to implement a risk management system to ...
Question 123: How can organizations obtain information about threats throu...
Question 124: Richard has been working as a Linux system administrator at ...
Question 125: Which of following are benefits of using loT devices in loT-...
Question 126: Geon Solutions INC., had only 10 employees when it started. ...
Question 127: Elden is working as a network administrator at an IT company...
Question 128: Tom works as a network administrator in a multinational orga...
Question 129: Which of the following information security standards define...
Question 130: Jason has set a firewall policy that allows only a specific ...
Question 131: The CEO of Max Rager wants to send a confidential message re...
Question 132: Martin is a professional hacker. He is performing reconnaiss...
Question 133: Which among the following is used to limit the number of cmd...
Question 134: How is a "risk" represented?
Question 135: Jason works as a System Administrator for www.company.com In...
Question 136: Andrew would like to configure IPsec in a manner that provid...
Question 137: Identify the firewall technology that monitors the TCP hands...
Question 138: Which type of attack is used to hack an IoT device and direc...
Question 139: What is the correct order of activities that a IDS is suppos...
Question 140: Which of the following data security technology can ensure i...
Question 141: Which type of modulation technique is used in local area wir...
Question 142: An employee of a medical service company clicked a malicious...
Question 143: How is the chip-level security of an IoT device achieved?...
Question 144: Identify the Password Attack Technique in which the adversar...
Question 145: Eric is receiving complaints from employees that their syste...
Question 146: What defines the maximum time period an organization is will...
Question 147: You are responsible for network functions and logical securi...
Question 148: Which of the following Wireshark filters can a network admin...
Question 149: Individuals in the organization using system resources again...
Question 150: Which of the following can be used to disallow a system/user...
Question 151: An US-based organization decided to implement a RAID storage...
Question 152: John wants to implement a firewall service that works at the...
Question 153: Lyle is the IT director for a medium-sized food service supp...
Question 154: An insider in Hexagon, a leading IT company in USA, was test...
Question 155: _______________ is a structured and continuous process which...
Question 156: Which of the following best describes the Log Normalization ...
Question 157: How does Windows' in-built security component, AppLocker, wh...
Question 158: John is a network administrator and is monitoring his networ...
Question 159: An organization needs to adhere to the______________rules fo...
Question 160: You want to increase your network security implementing a te...
Question 161: In ______ method, event logs are arranged in the form of a c...
Question 162: James is a network administrator working at a student loan c...
Question 163: If Myron, head of network defense at Cyberdyne, wants to cha...
Question 164: Who offers formal experienced testimony in court?...
Question 165: Which command is used to change the permissions of a file or...
Question 166: A company has the right to monitor the activities of their e...
Question 167: Identity the correct order for a successful black hat operat...
Question 168: You are an IT security consultant working on a contract for ...
Question 169: Management wants to bring their organization into compliance...
Question 170: The security network team is trying to implement a firewall ...