0
[{"id":371040,"quiz_id":"18798","answer_id":null,"answerType_id":"0","created_at":"2018-02-02 22:46:32","updated_at":"2018-02-02 22:46:32","questionName":"Which of the following components of an all-in-one security appliance would MOST likely be configured in order to restrict access to peer-to-peer file sharing websites?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":null,"explanation":"The question asks how to prevent access to peer-to-peer file sharing websites. You access a website by browsing to a URL using a web browser or peer-to-peer file sharing client software. A URL filter is used to block URLs to prevent users from accessing t","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":371058,"quiz_id":"18798","answer_id":null,"answerType_id":"0","created_at":"2018-02-03 00:43:07","updated_at":"2018-02-03 00:43:07","questionName":"Layer 7 devices used to prevent specific types of html tags are called:","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":null,"explanation":"A content filter is a type of software designed to restrict or control the content a reader is authorized to access","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":371253,"quiz_id":"18798","answer_id":null,"answerType_id":"0","created_at":"2018-02-03 12:04:54","updated_at":"2018-02-03 12:04:54","questionName":"Which of the following was MOST likely used to generate this log? A security engineer is reviewing log data and sees the following output: POST: \/payload.php HTTP\/1.1 HOST: localhost Accept:*\/* Referrer: http:\/\/localhost\/ ******* HTTP\/1.1 403 Forbidden Connection:close Log: Access denied with 403. Pattern matches form bypass","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":null,"explanation":" A web application firewall is a device, server add on, virtual service, or system filter that defines a strict set of communication rules for a website and its visitors. It's intended to be an application specific firewall to prevent cross-scripting, SQL","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":371254,"quiz_id":"18798","answer_id":null,"answerType_id":"0","created_at":"2018-02-03 12:07:08","updated_at":"2018-02-03 12:07:08","questionName":"An admin would like to review the effectiveness of existing security in the enterprise. Which of the following would be the BEST place to start?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":null,"explanation":"The main functions of intrusion prevention systems are to identify malicious activity, log info about this activity, attempt to stop it","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":371068,"quiz_id":"18798","answer_id":null,"answerType_id":"0","created_at":"2018-02-03 01:09:52","updated_at":"2018-02-03 01:09:52","questionName":"Which of the following should the security administrator implement to limit web traffic based on country of origin (select three)?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":null,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":371255,"quiz_id":"18798","answer_id":null,"answerType_id":"0","created_at":"2018-02-03 12:09:02","updated_at":"2018-02-03 12:09:02","questionName":"A company has proprietary mission critical devices connected to their network which are configured remotely by both employees and approved customers. The admin wants to monitor device security without changing their baseline configuration. Which of the following should be implemented to secure the devices without risking availability?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":null,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":371037,"quiz_id":"18798","answer_id":null,"answerType_id":"0","created_at":"2018-02-02 22:40:58","updated_at":"2018-02-02 22:42:10","questionName":"Which of the following should be deployed to prevent the transmission of malicious traffic between virtual machines hosted on a singular physical device on a network?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":0,"explanation":"Host based intrusion prevention system (HIPS) is an installed software package which monitors a single host for suspicious activity by analyzing events occurring within that host.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":371062,"quiz_id":"18798","answer_id":null,"answerType_id":"0","created_at":"2018-02-03 01:03:42","updated_at":"2018-02-03 01:03:42","questionName":"A review of the company's network traffic shows that most of the malware infections are caused by users visiting gambling and gaming websites. The security manager wants to implement a solution that will block these websites., scan all websites for signs of malware, and block the malware before it enters the company network. Which of the following is suited for this purpose?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":null,"explanation":"An all in one appliance, Unified Threat Management (UTM) and Next Generation Firewll (NGFW) is one that provides a good foundation for security. ","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":371059,"quiz_id":"18798","answer_id":null,"answerType_id":"0","created_at":"2018-02-03 00:56:45","updated_at":"2018-02-03 00:56:45","questionName":"Pete, an employee, attempts to visit a popular social networking site but is blocked. Instead, a page is displayed notifying him that the page cant be displayed. Which of the following is the MOST likely reason for the blocking?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":null,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":371042,"quiz_id":"18798","answer_id":null,"answerType_id":"0","created_at":"2018-02-02 22:51:19","updated_at":"2018-02-02 22:51:19","questionName":"The admin receives a call from an employee named Joe. Joe says the internet is down and he is receiving a blank page when typing to connect to a popular sports website. The admin asks Joe to try visiting a popular search engine site, which Joe reports as successful. Joe then says that he can get to the sports site on his phone. Which of the following might the admin need to configure?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":null,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":371066,"quiz_id":"18798","answer_id":null,"answerType_id":"0","created_at":"2018-02-03 01:07:10","updated_at":"2018-02-03 01:07:10","questionName":"Which of the following is BEST at blocking attacks and providing security at Layer 7 of the OSI model?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":null,"explanation":"A WAF is an appliance, server plugin, or filter that applies a set of rules to an HTTP conversation.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":371041,"quiz_id":"18798","answer_id":null,"answerType_id":"0","created_at":"2018-02-02 22:48:36","updated_at":"2018-02-02 22:48:36","questionName":"Pete, the system administrator, wants to restrict access to advertisements, games, and gambling web sites. Which of the following devices would BEST achieve this goal?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":null,"explanation":"","question_score_id":null,"lang":null,"questionAudioPath":null}]