Term
C. Enable stateful inspection on the UTM |
|
Definition
A UTM is deployed on the external edge of the main corporate office. The office connects to the WAN port of the edge router. The edge router at the main office connects to the remote offices using GRE IPSec tunnels. A network administrator notices that a worm that was not detected by the UTM has spread from the remote sites into the corporate network. The UTM currently has traffic rules applied that should block the port used by the worm. Which of the following steps would MOST likely correct this issue?
A. Move the UTM onto the LAN side of the network B. Enable TLS inspection on the UTM C. Enable stateful inspection on the UTM D. Configure the UTM to deny encrypted files from being transferred |
|
|
Term
|
Definition
A network technician has implemented ACLs to limit access to cloud-based file storage. Which of the following security mechanisms has the technician enforced?
A. DLP B. IDS C. WAF D. WPA E. TPM |
|
|
Term
|
Definition
A firewall administrator is implementing a rule that directs HTTP traffic to an internal server listening on a non-standard socket. Which of the following types of rules is the administrator implementing?
A. NAT B. PAT C. STP D. SNAT E. ARP |
|
|
Term
A. Install additional WAPs |
|
Definition
A technician is installing a new wireless badging system on a hospital network. The requirements of the badging system are for it to have its own SSID and low power levels. The badging system has to cover 99.9% of the hospital. Which of the following is the BEST action to take to meet the system requirements?
A. Install additional WAPs B. Install external antennas C. Move the WAPs closer to the more populated area D. Change the antenna types |
|
|