A stateful firewall is most vulnerable to resource exhaustion during A DNS cache refresh B VLAN tagging error C SYN
Continue readingCategory: 0. BLOG
Your blog category
Chapter 13: Network Security and Protective Technologies (Set-9)
While migrating services, the safest firewall change method is A Allow all temporarily B Disable logging C Stage and test
Continue readingChapter 13: Network Security and Protective Technologies (Set-8)
When creating firewall rules for a new server, the safest starting approach is A Allow all first B Disable firewall
Continue readingChapter 13: Network Security and Protective Technologies (Set-7)
In a firewall rule, “protocol” commonly means A Screen refresh rate B TCP or UDP C File folder type D
Continue readingChapter 13: Network Security and Protective Technologies (Set-6)
A firewall is mainly used to control A Network traffic flow B Screen display size C Battery charging speed D
Continue readingChapter 13: Network Security and Protective Technologies (Set-5)
A stateful firewall may fail under attack if its A DNS cache clears B State table fills C Disk space
Continue readingChapter 13: Network Security and Protective Technologies (Set-4)
A firewall “default deny” policy should be paired with A Open all ports B Disable NAT C Documented allow list
Continue readingChapter 13: Network Security and Protective Technologies (Set-3)
To reduce rule mistakes, firewall policies should follow A Maximum openness B Random allowance C Least privilege D No documentation
Continue readingChapter 13: Network Security and Protective Technologies (Set-2)
A basic firewall rule usually matches traffic using A Screen resolution B File extension C Battery level D IP and
Continue readingChapter 13: Network Security and Protective Technologies (Set-1)
A firewall mainly helps a network by A Increasing internet speed B Repairing hard disks C Blocking unwanted traffic D
Continue reading