CompTIA Security+ Cert Prep #1 (48)

Exit

Question 1 of 1

  Time Left


0 [{"id":235406,"quiz_id":"13463","answer_id":null,"answerType_id":"0","created_at":"2017-07-07 20:39:24","updated_at":"2017-07-07 22:24:00","questionName":"Pete, a security administrator, has observed repeated attempts to break into the network. Which of the following is designed to stop an intrusion on the network?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":11,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":235394,"quiz_id":"13463","answer_id":null,"answerType_id":"0","created_at":"2017-07-07 20:33:56","updated_at":"2017-07-07 22:24:00","questionName":"Which of the following security devices can be replicated on a Linux based computer using IP tables to inspect and properly handle network based traffic?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":2,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":235400,"quiz_id":"13463","answer_id":null,"answerType_id":"0","created_at":"2017-07-07 20:37:11","updated_at":"2017-07-07 22:24:00","questionName":"Which of the following devices would be MOST useful to ensure availability when there are a large number of requests to a certain website?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":7,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":235403,"quiz_id":"13463","answer_id":null,"answerType_id":"0","created_at":"2017-07-07 20:37:44","updated_at":"2017-07-07 22:24:00","questionName":"Pete, the system administrator, wishes to monitor and limit users\u2019 access to external websites. Which of the following would BEST address this?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":8,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":235404,"quiz_id":"13463","answer_id":null,"answerType_id":"0","created_at":"2017-07-07 20:38:13","updated_at":"2017-07-07 22:24:00","questionName":"Mike, a network administrator, has been asked to passively monitor network traffic to the company\u2019s sales websites. Which of the following would be BEST suited for this task?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":9,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":235408,"quiz_id":"13463","answer_id":null,"answerType_id":"0","created_at":"2017-07-07 20:40:24","updated_at":"2017-07-07 22:24:00","questionName":"In intrusion detection system vernacular, which account is responsible for setting the security policy for an organization?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":13,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":235393,"quiz_id":"13463","answer_id":null,"answerType_id":"0","created_at":"2017-07-07 20:33:27","updated_at":"2017-07-07 22:24:00","questionName":"The security administrator at ABC company received the following log information from an external party: 10:45:01 EST, SRC 10.4.3.7:3056, DST 8.4.2.1:80, ALERT, Directory traversal 10:45:02 EST, SRC 10.4.3.7:3057, DST 8.4.2.1:80, ALERT, Account brute force 10:45:03 EST, SRC 10.4.3.7:3058, DST 8.4.2.1:80, ALERT, Port scan The external party is reporting attacks coming from abc-company.com. Which of the following is the reason the ABC company\u2019s security administrator is unable to determine the origin of the attack?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":1,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":235407,"quiz_id":"13463","answer_id":null,"answerType_id":"0","created_at":"2017-07-07 20:39:53","updated_at":"2017-07-07 22:24:00","questionName":"An administrator is looking to implement a security device which will be able to not only detect network intrusions at the organization level, but help defend against them as well. Which of the following is being described here?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":12,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":235399,"quiz_id":"13463","answer_id":null,"answerType_id":"0","created_at":"2017-07-07 20:36:40","updated_at":"2017-07-07 22:24:00","questionName":"Which of the following is a best practice when securing a switch from physical access?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":6,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":235409,"quiz_id":"13463","answer_id":null,"answerType_id":"0","created_at":"2017-07-07 20:40:56","updated_at":"2017-07-07 22:24:00","questionName":"When performing the daily review of the system vulnerability scans of the network Joe, the administrator, noticed several security related vulnerabilities with an assigned vulnerability identification number. Joe researches the assigned vulnerability identification number from the vendor website. Joe proceeds with applying the recommended solution for identified vulnerability. Which of the following is the type of vulnerability described?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":14,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":235405,"quiz_id":"13463","answer_id":null,"answerType_id":"0","created_at":"2017-07-07 20:38:41","updated_at":"2017-07-07 22:24:00","questionName":"Which of the following should be deployed to prevent the transmission of malicious traffic between virtual machines hosted on a singular physical device on a network?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":10,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":235395,"quiz_id":"13463","answer_id":null,"answerType_id":"0","created_at":"2017-07-07 20:34:45","updated_at":"2017-07-07 22:24:00","questionName":"Which of the following firewall types inspects Ethernet traffic at the MOST levels of the OSI model?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":3,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":235392,"quiz_id":"13463","answer_id":null,"answerType_id":"0","created_at":"2017-07-07 20:31:45","updated_at":"2017-07-07 22:24:00","questionName":"Which of the following devices is MOST likely being used when processing the following? 1 PERMIT IP ANY ANY EQ 80, 2 DENY IP ANY ANY","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":0,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":235398,"quiz_id":"13463","answer_id":null,"answerType_id":"0","created_at":"2017-07-07 20:36:02","updated_at":"2017-07-07 22:24:00","questionName":"Which of the following network design elements allows for many internal devices to share one public IP address?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":5,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":235397,"quiz_id":"13463","answer_id":null,"answerType_id":"0","created_at":"2017-07-07 20:35:32","updated_at":"2017-07-07 22:24:00","questionName":"The Chief Information Security Officer (CISO) has mandated that all IT systems with credit card data be segregated from the main corporate network to prevent unauthorized access and that access to the IT systems should be logged. Which of the following would BEST meet the CISO\u2019s requirements?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":4,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null}]
235406
0
120
block

Pete, a security administrator, has observed repeated attempts to break into the network. Which of the following is designed to stop an intrusion on the network?

Select the Correct Answers  

(0/0)












235394
0
120
none
235400
0
120
none
235403
0
60
none
235404
0
120
none
235408
0
120
none
235393
0
120
none
235407
0
120
none
235399
0
120
none
235409
0
120
none
235405
0
120
none
235395
0
120
none
235392
0
60
none
235398
0
120
none
235397
0
60
none