Bonnie has been charged with doing an investigation of the firewall infrastructure at her workplace. The company employs a lot of employees who work remotely from their homes in addition to having several office sites spread out around the United States. She discovers that a large number of the current firewalls are no longer maintained by the manufacturer and has persuaded the corporation to set aside some funds to acquire a replacement. Which of the following options may she suggest in their place?
Blog
Thelonius has just created a new virtual machine. By default…
Thelonius has just created a new virtual machine. By default, the cloud service provider automatically configured it as part of a class C private network. Which of the following is the default subnet mask expressed in CIDR notation that was configured?
Marissa is wanting to implement a VPN at her company but kno…
Marissa is wanting to implement a VPN at her company but knows that some of the places the users need to connect from have issues with IPsec being used through the firewall. Which of the following protocols should she choose?
Fictional Corp. is in need of a cloud service provider. They…
Fictional Corp. is in need of a cloud service provider. They have whittled down their options to two CSPs that might satisfy their technical requirements after taking into account a number of factors. Which action might they additionally think about doing before committing to any agreements or opening an account on such platforms?
Len has identified encrypted files in the network databases…
Len has identified encrypted files in the network databases that contain sensitive information but are configured with access permissions that allow almost everyone access. What type of security issue is this?
Laurel is selecting a VPN protocol for her company’s network…
Laurel is selecting a VPN protocol for her company’s network. This network includes a large number of users that move between wireless hotspots in the course of their jobs. User privacy is also required when using the VPN. Which protocol should Laurel consider using?
Dez has been reading about encryption recently. She begins t…
Dez has been reading about encryption recently. She begins to wonder how anything can be secure if everyone is using the same set of algorithms. After all, anyone using the same algorithm would be able to decrypt anything that had been encrypted using that algorithm. Which of the following helps make the data unusable by anyone else using that same encryption scheme without having this information?
Denis is trying to determine which route’s packets are trave…
Denis is trying to determine which route’s packets are traveling over when accessing his company’s chosen cloud service provider. Which of the following Windows tools can help him discover that information?
Marcus has been asked to configure a web server with a speci…
Marcus has been asked to configure a web server with a specific private class C IP address. Which of the following is a possible address she was given?
Marcella has been hired to perform an audit of a security in…
Marcella has been hired to perform an audit of a security incident where a large corporation was using an open-source application that they had deployed to a cloud service provider. The application was used to manage the many people whose information it tracked and included a lot of identifying information about them that could be used in identity fraud. Unfortunately, the person that installed the application never removed the default administrative account that was still using the default password. Which of the following describes this scenario?