This seems straightforward. DHCP snooping and IP source guard are the two Layer 2 security features that can help minimize the concern about spoofed MAC addresses on the LAN. I'm confident those are the right choices.
I'm a little confused by the wording of this question. Isn't MAC address spoofing more of a Layer 2 issue? I'm not sure if IP source guard is the best choice here. I'll go with DHCP snooping and dynamic ARP inspection.
Hmm, I'm a bit unsure about this one. I know DHCP snooping is used to prevent rogue DHCP servers, but I'm not sure how that relates to MAC address spoofing. I'll have to think this through carefully.
The answer is definitely False. The auditor's responsibility is to evaluate the anti-fraud controls, not to establish them. The organization itself has the primary responsibility for designing and implementing those controls.
Option D sounds right to me. It makes sense that if patients see Dr. Chan as independent, it might limit Eagle's liability. We had a practice question like this before, didn't we?
I'm pretty confident that the answer is B. Exposing or publishing the ports is the standard way to access containers on a bridge network from outside the host.
upvoted 0 times
...
Log in to Pass4Success
Sign in:
Report Comment
Is the comment made by USERNAME spam or abusive?
Commenting
In order to participate in the comments you need to be logged-in.
You can sign-up or
login
Golda
3 months agoTess
3 months agoParis
3 months agoMerilyn
4 months agoBuck
4 months agoCarol
4 months agoErin
4 months agoFreeman
4 months agoChristene
5 months agoBuddy
5 months agoAgustin
5 months agoLuz
5 months agoShenika
5 months agoLeonora
5 months agoVallie
5 months agoEleonora
5 months agoDalene
5 months ago