Your organization recently deployed a Linux-based firewall using iptables with custom rules for packet filtering. After deployment, users report that they cannot access a public-facing web server hosted internally, even though the rule -A INPUT -p tcp –dport 80 -j ACCEPT exists. Upon reviewing the rules, you find the following: -A INPUT -m conntrack –ctstate ESTABLISHED,RELATED -j ACCEPT-A INPUT -p icmp -j ACCEPT-A INPUT -p tcp –dport 22 -j ACCEPT-A INPUT -p tcp –dport 80 -j ACCEPT-A INPUT -j DROP
Blog
Anne is using a VPN to access the internet on a public café…
Anne is using a VPN to access the internet on a public café Wi-Fi. She forgets to enable the VPN kill switch. Suddenly, her VPN disconnects due to weak signal strength. Which of the following is the most likely risk in this scenario?
A cybersecurity analyst is reviewing encrypted messages sent…
A cybersecurity analyst is reviewing encrypted messages sent between two field agents. The encryption uses a symmetric key, which was securely exchanged beforehand. However, during a mission, the adversary manages to steal the encrypted message and attempts to replay it later. You’re called in to harden the system against this kind of attack. Which of the following countermeasures should be prioritized, and why?
Your company is deploying a cloud environment using Open vSw…
Your company is deploying a cloud environment using Open vSwitch (OVS) in an SDN architecture to connect virtual machines (VMs) hosted on different compute nodes. The SDN controller (running OpenFlow 1.3) proactively installs flow rules in the OVS instances to optimize traffic handling. After deployment, the network team notices unexpected latency and high CPU usage on several hypervisors. On inspection, they find that most packets are being forwarded via user space in OVS instead of the expected kernel space fast path. Given this scenario, which of the following is the most likely cause of the performance degradation?
A research institution is deploying a Science DMZ to facilit…
A research institution is deploying a Science DMZ to facilitate petabyte-scale data transfers with collaborators across the globe. The security team raises concerns about relaxing traditional firewall protections. As the network architect, which of the following solutions best addresses performance and security in the Science DMZ design?
Before bacteria can be identified, mixed cultures must be se…
Before bacteria can be identified, mixed cultures must be separated. What technique is used to separate bacteria and get individual colonies?
Which of the following best describes a housekeeping gene?
Which of the following best describes a housekeeping gene?
One type of mutation that can cause a frameshift is ________…
One type of mutation that can cause a frameshift is __________________ .
Read the case history and then answer the questions.Sickle C…
Read the case history and then answer the questions.Sickle Cell AnemiaThe Peters family recently returned home from Ethiopia after adopting their son Trace. He was 22 months old, and little was known about his medical history. Upon returning to the United States, an international adoption specialist reviewed his file and requested blood work. It was determined that the fatigue, jaundice, and swollen joints Trace had been experiencing were caused by sickle cell anemia. What type of mutation causes sickle cell anemia?
Identify the stages of biofilm formation shown on the image…
Identify the stages of biofilm formation shown on the image below.