Answered step by step
Verified Expert Solution
Question
1 Approved Answer
QUESTION 47 Bob has setup three web servers on windows server 2012 lIS8.0. Bob has followed all the recommendations for securing the OS and lIS.
QUESTION 47 Bob has setup three web servers on windows server 2012 lIS8.0. Bob has followed all the recommendations for securing the OS and lIS. These servers are going to run numerous e- commence websites that are projected to bring in thousands of dollars a day. Bob is still concerned about the security of these servers because of the potential for financial loss. Bob has asked his company's firewall administrator to set the firewall to inspect all incoming traffic on ports 80 and 443 to ensure that no malicious data is getting into the network. Why will this not be possible? firewalls cannot inspect traffic coming through port 80. firewalls can only inspect outbound traffic firewalls cannot inspect traffic payload at all, they can only block or allow certain ports firewalls canot inspect traffic coming through port 443 QUESTION 48 Samantha was hired to perform an internal security test of company XYZ. She quickly found that all networks are making use of switches instead of traditional hubs. This greatly limits her ability to perform network sniffing for information gathering. Which of the following techniques could she use use to gather information from the switched network or to disable some of the traffic isolation feature of the swich? sniff in promiscuous mode ethernet zapping ARP spoofing TCP session hijacking
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started