Which two keywords can be used in an access control list to replace a wildcard mask or address and wildcard mask pair? (Choose two.)
Which two keywords can be used in an access control list to replace a wildcard mask or address and wildcard mask pair? (Choose two.) Explanation: The host keyword is used…
ACL Question
Refer to the exhibit. A router has an existing ACL that permits all traffic from the 172.16.0.0 network. The administrator attempts to add a new ACE to the ACL that…
The IT department is tasked to implement a system that controls what a user can and cannot do on the corporate network. Which process should be implemented to meet the requirement?
The IT department is tasked to implement a system that controls what a user can and cannot do on the corporate network. Which process should be implemented to meet the…
Which component of the zero trust security model focuses on secure access when an API, a microservice, or a container is accessing a database within an application?
Which component of the zero trust security model focuses on secure access when an API, a microservice, or a container is accessing a database within an application? Explanation: The workload…
What is a feature of virtual LANs (VLANs)?
What is a feature of virtual LANs (VLANs)? Explanation: Virtual LANs (VLANs) provide a logical segmentation by creating multiple broadcast domains on the same network switch. VLANs provide higher utilization…
In a comparison of biometric systems, what is the crossover error rate?
In a comparison of biometric systems, what is the crossover error rate? Explanation: In comparing biometric systems, there are several important factors to consider including accuracy, speed or throughput rate,…
A threat actor has successfully breached the network firewall without being detected by the IDS system. What condition describes the lack of alert?
A threat actor has successfully breached the network firewall without being detected by the IDS system. What condition describes the lack of alert? Explanation: A false negative is where no…
What information is contained in the options section of a Snort rule?
What information is contained in the options section of a Snort rule? Explanation: Snort rules consist of two sections, the rules header and the rule options. The rule options section…
What are two scenarios where probabilistic security analysis is best suited? (Choose two.)
What are two scenarios where probabilistic security analysis is best suited? (Choose two.) Explanation: Probabilistic analysis relies on statistical techniques that are designed to estimate the probability that an event…
Which classification indicates that an alert is verified as an actual security incident?
Which classification indicates that an alert is verified as an actual security incident? Explanation: Alerts can be classified as follows: True Positive: The alert has been verified to be an…