Which of the following planes is important to understand for defense in depth?
A. Management plane
B. Control plane
C. User/data plane
D. Services plane
Which of the following are examples of scalable, commercial, and open source log-collection and -analysis platforms? (Select all that apply.)
A. Splunk
B. Spark
C. Graylog
D. Elasticsearch, Logstash, and Kibana (ELK) Stack
Which utility is the best to block a host portscan?
A. host-based firewall
B. antimalware
C. HIDS
D. sandboxing
Which statement identifies the primary difference between a transparent proxy deployment and an explicit proxy deployment?
A. In transparent proxy deployments, the client web browser is configured to use an HTTP proxy which sends traffic to the web content security system.
B. In explicit proxy deployments, the client web browser does not need to be altered. Instead, the Internet router will forward the redirect request to the destination web server.
C. With transparent proxy deployments, any WCCPv2-capable device will redirect all TCP port 81 and port 445 traffic to the content security system.
D. Deploying an explicit proxy configuration, the client-web browser must be statically set to use the HTTP proxy specifically.
To provide origin authentication, the sender encrypts the message using an asymmetric encryption algorithm. In this case, the receiver of the message must use what to decrypt the message?
A. sender's digital signature
B. sender's shared key
C. sender's private key
D. sender's public key
Which one of the following methods allows you to verify entity authentication, data integrity, and authenticity of communications, without encrypting the actual data?
A. Both parties calculate an authenticated MD5 hash value of the data accompanying the message - one party uses the private key, while the other party uses the public key.
B. Both parties to the communication use the same secret key to produce a message authentication code to accompany the message.
C. Both parties calculate a CRC32 of the data before and after transmission of the message.
D. Both parties obfuscate the data with XOR and a known key before and after transmission of the message.
When encapsulating data using the OSI model as a reference, the MAC address of the sending and receiving hosts is identified at which layer?
A. Layer 7
B. Layer 2
C. Layer 4
D. Layer 3
Which one of the following subnet masks is equivalent to the /26 prefix?
A. 255.255.192.0
B. 255.255.255.128
C. 255.255.255.192
D. 255.255.255.248
Which form of NAT uses port addresses to distinguish between translated sessions?
A. static NAT
B. policy NAT
C. dynamic PAT
D. dynamic NAT