What is the way to decide how a packet will move from an untrusted outside host to a protected inside that is behind a firewall, which permits the hacker to determine which ports are open and if the packets can pass through the packet-filtering of the firewall?
Correct Answer:B
What does a firewall check to prevent particular ports and applications from getting packets into an organization?
Correct Answer:A
In the context of Windows Security, what is a 'null' user?
Correct Answer:C
Bob, a system administrator at TPNQM SA, concluded one day that a DMZ is not needed if he properly configures the firewall to allow access just to servers/ports, which can have direct internet access, and block the access to workstations.
Bob also concluded that DMZ makes sense just when a stateful firewall is available, which is not the case of TPNQM SA.
In this context, what can you say?
Correct Answer:C
Which of the following is the least-likely physical characteristic to be used in biometric control that supports a large company?
Correct Answer:C
What hacking attack is challenge/response authentication used to prevent?
Correct Answer:A