Questions
- Which of the following technologies can be used to prevent an insider from sending fake ARP messages to other devices on the network?
A. Switch security
B. Dynamic ARP inspection
C. DHCP snooping
D. Port security
- Which of the following protocols can be used by an attacker to exfiltrate data while evading detection?
A. ICMP
B. SMTP
C. DNS
D. All the above
- Which DNS record is used to resolve the email servers of a domain?
A. PTR
B. CNAME
C. AAAA
D. MX
- An organization wants to filter traffic between the internet and its corporate network. Which of the following security solutions is recommended?
A. IPS
B. Firewall
C. Router
D. SIEM
- An IPS does not trigger an alert while a threat exists on the network. Which of the following best describes this action?
A. True negative
B. False negative
C. True positive
D. False positive
- Which of the following security solutions can help prevent spam?
A. Firewall
B. WSA
C. ESA
D. Antivirus
- Which of the following is the best approach to...