In order to protect against unauthorized DHCP servers on the network, you can enable the DHCP snooping feature on the switch. You can also enable ARP inspection to help protect against malicious ARP messages
MAC address filtering
After installing the network operating system, you should harden it, which involves removing unnecessary services. Removing unnecessary services helps secure the system, because each additional piece of software running provides more security holes for a
Disable the firewall.
Build user accounts.
Harden the operating system.
After hardening the operating system, you should patch the server to apply security fixes to any software running on the server.
C. Patch the server.
A. Install antivirus software.
B. Install antispyware software.
D. None of the above.
You would ensure that administrators are encrypting traffic between their administrative workstations and the network devices by using SSH. SSH is a secure replacement to the unsecure Telnet protocol.
One of the benefits of using an electronic locking mechanism is that they typically log when someone gains access to the facility.
Use an electronic locking system and give each employee a separate code
Give each employee a key to the server room.
Ask Jane to store the key in her desk and log anyone who uses the key.
Give employees a key to the server room and ask them to record an entry in the paper-based log by the entrance.
Examples of biometrics used to gain access to a facility are a retina scan, voice recognition, and a fingerprint scan.
A key fob
A firewall is used to secure the internal network from the outside world by rules configured on the firewall that specify which packets to drop and which packets to allow through.
D. None of the above
A dual-homed host firewall contains two physical network interfaces.
A screened-host firewall
A dual-homed host firewall
A screening router
A screened subnet firewall
A firewall and two screening routers are required in a screened subnet configuration.
Two screening routers
Single screening router
Host firewall server
The packet level controls the network or transport layer within packets, creating rules that allow or deny traffic based on IP address (layer 3) or port number (layer 4).
B. Application level
A. Packet level
C. Circuit level
The goal of the first responder is to contain the security incident and ensure the incident does not become a bigger problem.
Contain the incident.
Capture an image.
Analyze the digital data.
Placing a legal hold on Sue’s mailbox ensures that she cannot delete messages from her mailbox while you start your investigation.
Seize Sue’s laptop.
Place a legal hold on the e-mail.
Seize Sue’s phone.
Back the e-mail up.
选择要在Apple App Store上查看的Topgrade应用程序。