355
100. C. The command
ip ftp username USER will configure the username USER for FTP
connections. The command
ip ftp password USERPASS will configure the password
USERPASS for FTP connections. The command
ip ftp username USER password
USERPASS is incorrect. The command ftp USER password USERPASS is incorrect. The
command
username USER password USERPASS is incorrect.
Chapter 5: Security Fundamentals
(Domain 5)
1. B. The perimeter area, or perimeter network, is outside of the corporate firewall. The
perimeter area generally holds equipment necessary for routing to the ISP. The DMZ is in
between the perimeter network and the internal network. The internal area is the area or
network inside of your organization. A trusted area is an area or network that has a high
level of trust; generally your internal area is a trusted area.
2. A. The DMZ is an area that is protected by the corporate firewall. The DMZ area is in
between the perimeter network and the internal network. However, it allows servers such
as web servers, email servers, and application servers to be accessible via the Internet.
The perimeter area, or perimeter network, is outside of the corporate firewall. The
perimeter area generally holds equipment necessary for routing to the ISP. The internal
area is the area or network inside of your organization. A trusted area is an area or
network that has a high level of trust; generally your internal area is a trusted area.
3. C. An intrusion prevention system, or IPS, can detect and prevent attacks based on
their signature. They are commonly found in firewall systems such as Firepower Threat
Defense (FTD) devices. Honey pots are server or network appliances that have been
security weakened to attract bad actors so their actions and tactics can be examined.
An IDS is a system that can detect an attack based upon a signature. They too are found
in firewall systems such as FTD devices. Although similar to an IPS, the IDS will only
notify someone in the event of a detection. A host intrusion detection system (HIDS) is an
application that runs on a host to detect intrusions. A HIDS is similar to an IDS, but it is
all software based and resides on the host it is to protect.
4. A. The internal network is defined by the firewall. Anything protected by the firewall on
the internal network is considered to be the trusted network. The Internet is an untrusted
network, because it is outside of your control and outside of your organization. The DMZ
area is in between the perimeter network and the internal network. A network with SSL
encryption is not considered trusted; it is considered encrypted. A network with SSL can
travel over an untrusted network such as the Internet.
Do'stlaringiz bilan baham: |