Which of the following is not an advantage of a load balancer? a. The risk of overloading a desktop client is reduced. b. Network hosts can benefit from having optimized bandwidth. c. Network downtime can be reduced. d. DoS attacks can be detected and stopped.
Q: Under which condition is using the trial-and-error approach not advisable? (Choose all that apply.)…
A: Under which condition is using the trial-and-error approach not advisable? (Choose all that apply.)…
Q: A(n). firewall is placed between a private and public network. Group of answer choices a. host-based…
A: - We need to choose the correct options for the operations.
Q: User A is trying the login with his account, but he is getting the following message: “The trust…
A: The Complete answer is given below.
Q: You want to find weaknesses on a host device and compile findings into a database. What do you use?…
A: Finding weakness of host device and compiling finding into database
Q: with a compromised Linux operating system. Which of t
A: Given: An attacker detects that commands such as "cdilsrm" do not work when they provide an SSH…
Q: 102 How does a cloud-based distributed denial-of-service (DoS) protection strategy help in the event…
A: Given: How does a cloud-based distributed denial-of-service (DoS) protection strategy help in the…
Q: Clients are reporting slowness when attempting to access a series of load-balanced APIs that do not…
A: To use OAuth 2.0 to protect an API so that an application can access it on behalf of a user The flow…
Q: Which of the following is correct about passive attack? a. Involve modification of the data stream O…
A: Passive Attacks are in the nature of eavesdropping on or monitoring of transmission.
Q: User A is trying the login with his account, but he is getting the following message: "The trust…
A: This workstation's confidence arrangement with the primary domain has broken down. When an AD domain…
Q: On servers with Linux operating system, access logs are kept under which of the following…
A: As per our policy, "Since you have asked multiple questions, we will solve the first question for…
Q: so i am tasked with creating 10 new local users on powershell with descriptions and no passwords.…
A: Instead of entering the given script 10 times, we can use loops to create multiple users at time by…
Q: ndamental difference between page replacement. Android, Linux and Win
A: There is a fundamental difference between page replacement. Android, Linux and Windows.
Q: Question 2 Listen MC11: What is the following Snort command for? snort -i 3 -c…
A: The above question is solved in step 2 :-
Q: Hi, i would like to know how can i modify the firewall to let the DNS traffic in from any source in…
A: The firewall service can be changed using firewall control panel or using the API (Application…
Q: What is the DOS command to return the mac address of any clients from the server?…
A: Q1) DOS also provided a variety of basic device commands for common functions, for example listing…
Q: 304. Which of the following operating system is better for implementing a Client-Server network? a.…
A: Given: 304. Which of the following operating system is better for implementing a Client-Server…
Q: An attacker detects that commands such as "cd,ls,rm" do not work when they provide an SSH connection…
A: An attacker detects that commands such as "cd,ls,rm" do not work when they provide an SSH connection…
Q: Which of the following does not qualify as a benefit of host virtualization? a. Penetration…
A: Introduction: Virtualization is a strategy for managing and presenting computer resources that is…
Q: does infected host machine infects all the vm create on it?
A: does infected host machine infects all the vm create on it?
Q: Where can I get Wifi security for the following security type: When the conventional method on a…
A: Intro WIFI Protected Access II is a security protocol used to protect wireless computer networks.…
Q: Which of the following best describes the principle of least privilege? A. Allow the user to have…
A: 1. D. Allow the user access to only what IS essential tor their job responsibilities 2. A. The…
Q: Which of the following does not qualify as a host virtualization benefit? a. Penetration testing…
A: Introduction: Virtualization is a strategy for managing and presenting computer resources that is…
Q: You have been working as the network administrator for JP Steels. In order to cut down on operating…
A: Reason: 1. Barracuda CloudGen Firewall is a collection of physical, virtual, and cloud-based…
Q: Which of the following is not an advantage of host virtualization? a. Penetration testing can be…
A: To be determine: Select right option
Q: True or False? (1)In addition to normal or forward name resolution, DNS provides reverse name…
A: -- In addition to normal or forward name resolution, DNS provides reverse name resolution, so that…
Q: QUESTION 8 Assume that you work as a network administrator. A colleague approaches you with an issue…
A: The Get-NetFirewallRule cmdlet returns the instances of firewall rules that match the search…
Q: Question 2 ( Listen MC11: What is the following Snort command for? snort -i 3 -c…
A: The above question is solved in step 2
Q: A cybersecurity engineer configures a series of virtual machines on an isolated network and…
A: Answer : Honeynet Honeynet is a network that setup to attract the potential attackers and distract…
Q: Netstat is a useful tool for checking network and Internet connections. Some useful applications for…
A: How many connections are ESTABLISHED? 7 connections were established
Q: You installed your new Windows Server 2012, but after the first day, the server was compromised by a…
A: d.All of the above
Q: 4- Which Linux file system introduced the j be used to minimize the risk of file system sudden power…
A: Answer the above questions are as follows:
Q: 7. Manage open and closed ports on the server from the client terminal (remember ssh).
A: manage open and close ports on the server from the client terminal
Q: Write a complete bash script that monitors who logs in and logs out of the current CSELinux machine…
A: print out the current date and time and report the number of users loggedin,even if there are no…
Q: A hacker has managed to gain access to a Linux host and stolen the password file from /etc/passwd.…
A: According to the question a Hacker managed to gain access to Linux host and able to steel password…
Q: Write a complete bash script that monitors who logs in and logs out of the current CSELinux machine…
A: the solution is given below :
Q: Write a complete bash script that monitors who logs in and logs out of the current CSELinux machine…
A: complete bash script that monitors who logs in and logs out of the current CSELinux machine (e.g.,…
Q: n Mac OS X, what file can an attacker replace with a no-password-requirement version to allow all…
A: In MAC OS, the file that is writeable as well as can be replaced with the other files is included in…
Q: ould you agree with the following statement about a P2P file-
A: Required: Would you agree with the following statement about a P2P file-sharing application: "There…
Q: Assume that you work as a network administrator. A colleague approaches you with an issue that he is…
A: I have given the answer to the above question with justification below.
Which of the following is not an advantage of a load balancer?
a. The risk of overloading a desktop client is reduced.
b. Network hosts can benefit from having optimized bandwidth.
c. Network downtime can be reduced.
d. DoS attacks can be detected and stopped.
Step by step
Solved in 3 steps
- Under which condition is using the trial-and-error approach not advisable? (Choose all that apply.) a. You can undo changes easily. b. A server or network device is live on the network. c. You can’t undo changes easily. d. No data can be lost.Problem 3 Short Answer A shoulder surfer reads what users enter on keyboards such as logon names, passwords and PINs. How to prevent shoulder surfing? What are firewalls? What are advantages of hardware firewalls? The following code is a Perl script, and it runs on Kali Linux. What is the result. # Perl program demonstrating branching $word = "Hack"; &speak; $word = "Or"; &speak; $word = "Die!"; &speak; sub speak { print "$word\n"; }Which of the following actions should you first take to secure your Linux computeragainst network attacks?a. Change permissions on key system files.b. Ensure that only necessary services are running.c. Run a checksum for each file used by network services.d. Configure entries in the /etc/sudoers file.
- Which of the following does not qualify as a host virtualization benefit? a. Penetration testing can be done on a computer using a simulated network environment and several virtual computers. b. Only one piece of anti-virus software is necessary. c. Security patches can be tested. d. The host operating system can be virtualized for training purposes.Netstat is a useful tool for checking network and Internet connections.Some useful applications for the average PC user are considered,including checking for malware connections. a. Open the command prompt window and:netstat –anESTABLISHED indicates that the server received the SYN signal from theclient and the session is established.How many connections are ESTABLISHED? b. To find out which programs are making connections with the outside world,we can use the command netstat –b.netstat –bList two programs that have made connections to the outside world. c. To view the routing table on the current machine, use netstat –rnetstat –rWhat is the IP address of the Gateway? d. How many entries are in the routing table in c? e. To display the statistics for only the TCP protocol, type the followingcommand:netstat –sp tcpHow many TCP segments were retransmitted? f. Based on e, how many current TCP connections are there?What are best practices for securing a Linux server? (Choose all that apply.)a. Lock the server in a server closet.b. Ensure that you are logged in as the root user to the server at all times.c. Ensure that SELinux or AppArmor is used to protect key services.d. Set the default run level to 1 (Single User Mode).
- Which of the following is not an advantage of host virtualization? a. Penetration testing can be performed using a simulated network environment on a computer using multiple virtual machines. b. Only one copy of anti-virus software is needed. c. Security patches can be tested. d. Host operating system virtualization can be used for training purposes.On servers with Linux operating system, access logs are kept under which of the following directories by default?A) /var/log/B) /var/log/auth/C)/log/D)/log/auth/ Which of the following would an attacker prefer to run operating system-level code with MSSQL?A) MSSQL cannot run code at the operating system level.B) MSSQL agentC) xp_cmdshellD) There are no options. As a network administrator, you want to reduce the attack surface on your systems. Which of the following helps?A) Creating shared folderB) Make sure that only the necessary services are activeC) To record access activitiesD) monitor network traffic Which of the following products can an institution prefer to use if its antivirus software is up-to-date on the computers in its network?A) FirewallB) DLPC) Web ProxyD) NAC When John enters the mobile banking app on his smartphone, he sees his account balance is decreasing. What would it be better for John to do first to fix this situation?A) Closing and reopening the mobile…You installed your new Windows Server 2012, but after the first day, the server was compromised by a malicious download. What post-installation task was not correctly implemented? installed a. Windows Server security patches were not b. A TCP/IP firewall exception was improperly made c. IE enhanced security was not enabled d.All of the above
- Kye wants to transfer files between a workstation and a server through a command-line interface, with encryption of both the data and the commands being used to copy the files. Which of the following protocols would provide these tools? a. FTPS b. FTP c. TFTP d. SFTPYou have been hired as a consultant for a new company with 35 users. You have determined they should use Windows Server 2019 with Windows 10 clients. One of the servers will provide centralized authentication and use Group Policy. Which of the following is a crucial question that you must answer before you can install these features on this server? a. What file sharing protocol should be used? b. What domain name should you use? c. What folders need to be shared? d. What CPU are the client computers usingClients are reporting slowness when attempting to access a series of load-balanced APIs that do not require authentication. The servers that host the APIs are showing heavy CPU utilization. No alerts are found on the WAFs sitting in front of the APIs. Which of the following should a security engineer recommend to BEST remedy the performance issues in a timely manner? Options: A Implement rate limiting on the API. B Implement geoblocking on the WAF. C Implement OAuth 2.0 on the API. D Implement input validation on the API. if you could explain why you chose that correct choice, Id appreciate it. Thank you!