Computer Skills Questions
Explore questions in the Computer Skills category that you can ask Spark.E!
A firewall administrator is investigating high packet buffer utilization in the company firewall. After looking at the threat logs and seeing many flood attacks coming from a single source that are dropped by the firewall, the administrator decides to enable packet buffer protection to protect against similar attacks.The administrator enables packet buffer protection globally in the firewall but still sees a high packet buffer utilization rate.What else should the administrator do to stop packet buffers from being overflowed?
NEW QUESTION 593Which of the following will increase cryptographic security?A. High data entropy.B. Algorithms that require less computing power.C. Longer key longevity.D. Hashing.
Which condition is required within the CLI for using the Tab key to generate a list of available options for a command?
NEW QUESTION 605A security analyst has been asked by the Chief Information Security Officer to:- develop a secure method of providing centralized management of infrastructure- reduce the need to constantly replace aging end user machines- provide a consistent user desktop experienceWhich of the following BEST meets these requirements?A. BYOD.B. Mobile device management.C. VDI.D. Containerization.
NEW QUESTION 595A recent security breach exploited software vulnerabilities in the firewall and within the network management solution. Which of the following will MOST likely be used to identify when the breach occurred through each device?A. SIEM correlation dashboards.B. Firewall syslog event logs.C. Network management solution login audit logs.D. Bandwidth monitors and interface sensors.
NEW QUESTION 604An organization is planning to open other datacenters to sustain operations in the event of a natural disaster. Which of the following considerations would BEST support the organization's resiliency?A. Geographic dispersal.B. Generator power.C. Fire suppression.D. Facility automation.
NEW QUESTION 591Which of the following control types is focused primarily on reducing risk before an incident occurs?A. PreventiveB. DeterrentC. CorrectiveD. Detective
NEW QUESTION 600An organization is moving away from the use of client-side and server-side certificates for EAR. The company would like for the new EAP solution to have the ability to detect rogue access points. Which of the following would accomplish these requirements?A. PEAPB. EAP-FASTC. EAP-TLSD. EAP-TTLS
NEW QUESTION 594Which of the following components can be used to consolidate and forward inbound Internet traffic to multiple cloud environments though a single firewall?A. Transit gateway.B. Cloud hot site.C. Edge computing.D. DNS sinkhole.
NEW QUESTION 599A cybersecurity administrator needs to implement a Layer 7 security control on a network and block potential attacks. Which of the following can block an attack at Layer 7? (Choose two.)A. HIDSB. NIPSC. HSMD. WAFE. NACF. NIDSG. Stateless Firewall
NEW QUESTION 601An amusement park is implementing a biometric system that validates customers' fingerprints to ensure they are not sharing tickets. The park's owner values customers above all and would prefer customers' convenience over security. For this reason, which of the following features should the security team prioritize FIRST?A. LOW FARB. Low EfficacyC. Low FRRD. Low CER
NEW QUESTION 603The Chief Information Security Officer warns to prevent exfiltration of sensitive information from employee cell phones when using public USB power charging stations. Which of the following would be the BEST solution to implement?A. DLP.B. USB data blocker.C. USB OTG.D. Disabling USB ports.
A network engineer is troubleshooting a VPN and wants to verify whether the decapsulation/encapsulation counters are increasing. Which CLI command should the engineer run?
Which CLI command is used to determine how much disk space is allocated to logs?
An engineer needs to see how many existing SSL decryption sessions are traversing a firewall.What command should be used?
NEW QUESTION 596Two organizations plan to collaborate on the evaluation of new SIEM solutions for their respective companies. A combined effort from both organizations' SOC teams would speed up the effort. Which of the following can be written to document this agreement?A. MOUB. ISAC. SLAD. NDA
NEW QUESTION 602A company recently experienced a significant data loss when proprietary information was leaked to a competitor. The company took special precautions by using proper labels; however, email filter logs do not have any record of the incident. An Investigation confirmed the corporate network was not breached, but documents were downloaded from an employee's COPE tablet and passed to the competitor via cloud storage. Which of the following is the BEST remediation for this data leak?A. User TrainingB. CASBC. MDMD. DLP
What can be used to create dynamic address groups?
You can customize the list of logs that are aggregated into the Unified log.
Where in the firewall web interface can you see whether sessions are going through a specific interface?
