CBROPS section 2

¡Supera tus tareas y exámenes ahora con Quizwiz!

What are four common algorithms that typical load balancers use to load balance the traffic? (Choose four.)

round robin, fewest connections, least time, hash

Which three types of devices can do NAT?

routers, Layer 3 switches, firewalls

Which benefit does a web application firewall provide, in addition to the benefits provided by a traditional load balancer?

protects web applications from common vulnerabilities and DDoS attacks

What is the first step in centralized syslog management?

Receive syslog messages from syslog clients that are distributed across the network and store those messages in a flat log file.

Which two protocols are most commonly found in AAA? (Choose two.)

TACACS+ and RADIUS

Which statement best describes how a network-based malware protection feature detects a possible event?

The firewall applies broad-based application and file control policies to detect malware

Which three elements can be configured in firewall policies to detect network-based malware? (Choose three.)

common protocols, SHA-256 hashes, metadata stored within the files

Which command is required on an interface in order to apply an ACL as a packet filter?

ip access-group

Which access control model originates from the military and uses security labels?

mandatory access control

How can the established keyword in an ACL entry be used?

to permit only the returning TCP packets from an already existing TCP connection, and deny the initial TCP packet of a new session from an untrusted network

Which security device is best for defending web servers against the OWASP Top 10 web application security risks?

web application firewall


Conjuntos de estudio relacionados