In order to protect against unauthorized DHCP servers on the network, you can enable the DHCP snooping feature on the switch. You can also enable ARP inspection to help protect against malicious ARP messages
MAC address filtering
After installing the network operating system, you should harden it, which involves removing unnecessary services. Removing unnecessary services helps secure the system, because each additional piece of software running provides more security holes for a
Build user accounts.
Harden the operating system.
Disable the firewall.
After hardening the operating system, you should patch the server to apply security fixes to any software running on the server.
C. Patch the server.
D. None of the above.
A. Install antivirus software.
B. Install antispyware software.
You would ensure that administrators are encrypting traffic between their administrative workstations and the network devices by using SSH. SSH is a secure replacement to the unsecure Telnet protocol.
One of the benefits of using an electronic locking mechanism is that they typically log when someone gains access to the facility.
Use an electronic locking system and give each employee a separate code
Give employees a key to the server room and ask them to record an entry in the paper-based log by the entrance.
Ask Jane to store the key in her desk and log anyone who uses the key.
Give each employee a key to the server room.
Examples of biometrics used to gain access to a facility are a retina scan, voice recognition, and a fingerprint scan.
A key fob
A firewall is used to secure the internal network from the outside world by rules configured on the firewall that specify which packets to drop and which packets to allow through.
D. None of the above
A dual-homed host firewall contains two physical network interfaces.
A screened-host firewall
A screening router
A screened subnet firewall
A dual-homed host firewall
A firewall and two screening routers are required in a screened subnet configuration.
Single screening router
Two screening routers
Host firewall server
The packet level controls the network or transport layer within packets, creating rules that allow or deny traffic based on IP address (layer 3) or port number (layer 4).
A. Packet level
B. Application level
C. Circuit level
The goal of the first responder is to contain the security incident and ensure the incident does not become a bigger problem.
Analyze the digital data.
Capture an image.
Contain the incident.
Placing a legal hold on Sue’s mailbox ensures that she cannot delete messages from her mailbox while you start your investigation.
Seize Sue’s phone.
Seize Sue’s laptop.
Back the e-mail up.
Place a legal hold on the e-mail.
選擇要在Apple App Store上查看的Topgrade應用程序。