A company has observed increased user traffic to gambling websites and wants to limit this behavior on work computers. Which of the following should the company most likely implement?
A content filter blocks access to specific websites based on category, URL, or keywords. This is the best solution to restrict gambling websites.
Breakdown of Options:
A . ACLs -- Control network access, not specific web content.
B . Content filter -- Correct answer. Used to block access to unwanted websites.
C . Port security -- Prevents unauthorized device connections, not web traffic filtering.
D . Screened subnet -- A DMZ isolates public-facing servers, not user restrictions.
CompTIA Network+ (N10-009) Official Study Guide -- Domain 3.3: Given a scenario, implement network security measures.
A network engineer discovers network traffic that is sending confidential information to an unauthorized and unknown destination. Which of the following best describes the cause of this network traffic?
Malware refers to any malicious software that can exfiltrate confidential data, including spyware, trojans, and rootkits. This fits the scenario where unauthorized data transfer is occurring.
Breakdown of Options:
A . Adware -- Displays ads, does not typically steal data.
B . Ransomware -- Encrypts files but does not exfiltrate data.
C . Darkware -- Not a real cybersecurity term.
D . Malware -- Correct answer. Malicious software is responsible for unauthorized data exfiltration.
CompTIA Network+ (N10-009) Official Study Guide -- Domain 3.5: Given a scenario, implement cybersecurity measures.
NIST 800-83: Malware Incident Prevention & Handling
Which of the following is associated with avoidance, acceptance, mitigation, and transfer?
These four terms---avoidance, acceptance, mitigation, and transfer---are strategies used in risk management.
From Andrew Ramdayal's guide:
''Risk in security refers to the potential for loss, damage, or destruction of assets or data due to a threat exploiting a vulnerability. Risk management strategies include avoidance, acceptance, mitigation, and transfer.''
A network administrator wants to restrict inbound traffic to allow only HTTPS to the company website, denying all other inbound traffic from the internet. Which of the following would best accomplish this goal?
AnAccess Control List (ACL)configured on theedge firewallis the correct and most effective solution tofilter inbound traffic. The administrator can allow TCP port 443 (HTTPS) and deny all other traffic. This is a classic firewall configuration for securing public-facing servers.
===========
[Networking Concepts]
Which of the following routing protocols needs to have an autonomous system set in order to establish communication with neighbor devices?
Clay
1 months agoAdelina
2 months agoAlyssa
2 months agoWhitley
2 months agoNenita
3 months agoSkye
3 months agoMacy
3 months agoKallie
4 months agoBilli
4 months agoAhmed
4 months agoDulce
5 months agoLindsay
5 months agoFabiola
5 months agoDaniela
6 months agoAmina
6 months agoGilbert
6 months agoColton
7 months agoEden
7 months agoJaney
7 months agoTy
7 months agoVinnie
8 months agoCurt
8 months agoMalcom
8 months agoPhillip
8 months agoRuthann
9 months agoFlo
9 months agoCory
9 months agoLong
9 months agoCharisse
9 months agoDeja
10 months agoLou
10 months agoShelton
10 months agoElli
10 months agoNell
11 months agoDerrick
11 months agoErinn
11 months agoPhuong
11 months agoNancey
11 months agoTasia
12 months agoAntione
12 months agoShawana
12 months ago