New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GAQM CPEH-001 Exam - Topic 2 Question 45 Discussion

Actual exam question for GAQM's CPEH-001 exam
Question #: 45
Topic #: 2
[All CPEH-001 Questions]

Rebecca has noted multiple entries in her logs about users attempting to connect on ports that are either not opened or ports that are not for public usage. How can she restrict this type of abuse by limiting access to only specific IP addresses that are trusted by using one of the built-in Linux Operating System tools?

Show Suggested Answer Hide Answer
Suggested Answer: B

ipchains is a free software based firewall for Linux. It is a rewrite of Linux's previous IPv4 firewalling code, ipfwadm. In Linux 2.2, ipchains is required to administer the IP packet filters. ipchains was written because the older IPv4 firewall code used in Linux 2.0 did not work with IP fragments and didn't allow for specification of protocols other than TCP, UDP, and ICMP.


Contribute your Thoughts:

0/2000 characters
Georgeanna
4 months ago
A is important, but it won't solve the IP issue directly.
upvoted 0 times
...
Buck
4 months ago
D sounds good too, but it's more about detection, not restriction.
upvoted 0 times
...
Elvera
4 months ago
Wait, can portsentry really help with this? Not sure about that.
upvoted 0 times
...
Ronna
4 months ago
Totally agree, ipchains is solid for this!
upvoted 0 times
...
Alpha
5 months ago
I think B is the best option for restricting IPs.
upvoted 0 times
...
Slyvia
5 months ago
I vaguely recall that using ipchains was a common practice for limiting access, but I might be mixing it up with iptables.
upvoted 0 times
...
Jamal
5 months ago
I think ensuring file permissions is important, but it doesn't really address the IP restriction part.
upvoted 0 times
...
Vincent
5 months ago
I feel like portsentry could help with monitoring, but I'm not sure if it actually restricts access like the question asks.
upvoted 0 times
...
Phuong
5 months ago
I remember studying about ipchains, but I think it's an older tool. Is it still relevant for this kind of task?
upvoted 0 times
...
Hershel
5 months ago
I'm pretty sure the answer is C, since the question states the configurable product is set to "Not Visible individually" but the variants are set to "Catalog, Search". That means the simple products should display on the listing page, but they'll share the same product detail page as the configurable product.
upvoted 0 times
...
Rory
5 months ago
I'm a bit confused by all these numbers and terms. I'll need to review my notes on bond pricing and credit spreads to make sure I understand this properly before answering.
upvoted 0 times
...
Filiberto
5 months ago
I'm leaning towards the Nimble CS series, but I want to make sure I fully understand the differences between the options before committing to an answer. Gotta be thorough on this one.
upvoted 0 times
...
Huey
5 months ago
I'm pretty sure risk management focuses more on protecting against financial losses and member safety, but I'm not clear on the exact line between that and medical management.
upvoted 0 times
...

Save Cancel