Home | Back to Courses
SC0-451 Tactical Perimeter Defense Certified Practice Exam

Partner: Udemy
Affiliate Name:
Area:
Description: Sample Questions:You are in the process of configuring your network firewall policy. As you begin building the content of the policy you start to organize the document into sections. Which of the following are sections found in the firewall policy?The Acceptable Use StatementThe Firewall Administrator StatementThe Network Connection StatementThe Incident Handling StatementThe Escalation Procedures StatementYou have just installed a new Intrusion Detection System in your network. You are concerned that there are functions this system will not be able to perform. What is a reason an IDS cannot manage hardware failures?The IDS can only manage RAID 5 failures.The IDS cannot be programmed to receive SNMP alert messages.The IDS cannot be programmed to receive SNMP trap messages.The IDS cannot be programmed to respond to hardware failures.The IDS can only inform you that an event happened.At a policy meeting you have been given the task of creating the firewall policy. What are the two basic positions you can take when creating the policy?To deny all traffic and permit only that which is required.To permit only IP traffic and filter TCP trafficTo permit only TCP traffic and filter IP trafficTo permit all traffic and deny that which is required.To include your internal IP address as blocked from incoming to prevent spoofing.Your company has created it's security policy and it's time to get the firewall in place. Your group is trying to decide whether to build a firewall or buy one. What are some of the benefits to purchasing a firewall rather than building one?They usually have a good management GUI.They offer good logging and alerting.You do not need to configure them.The OS doesn't need to be hardened before installing the vendor's firewall on it.They often do real time monitoring.You
Category:
Partner ID:
Price: 19.99
Commission:
Source: Impact
Go to Course