Question 25

What is the way to decide how a packet will move from an untrusted outside host to a protected inside that is behind a firewall, which permits the hacker to determine which ports are open and if the packets can pass through the packet-filtering of the firewall?

Correct Answer:B

Question 26

What does a firewall check to prevent particular ports and applications from getting packets into an organization?

Correct Answer:A

Question 27

In the context of Windows Security, what is a 'null' user?

Correct Answer:C

Question 28

Bob, a system administrator at TPNQM SA, concluded one day that a DMZ is not needed if he properly configures the firewall to allow access just to servers/ports, which can have direct internet access, and block the access to workstations.
Bob also concluded that DMZ makes sense just when a stateful firewall is available, which is not the case of TPNQM SA.
In this context, what can you say?

Correct Answer:C

Question 29

Which of the following is the least-likely physical characteristic to be used in biometric control that supports a large company?

Correct Answer:C

Question 30

What hacking attack is challenge/response authentication used to prevent?

Correct Answer:A

START 312-50v11 EXAM