An application is creating hashes of each file on an attached storage device. Which of the following will typically occur during this process?
Answer : A
You have been assigned to configure a DMZ that uses multiple firewall components.
Specifically, you must configure a router that will authoritatively monitor and, if necessary, block traffic. This device will be the last one that inspects traffic before it passes to the internal network. Which term best describes this device?
Answer : D
A distributed denial-of-service (DDOS) attack has occurred where both ICMP and TCP packets have crashed the company's Web server. Which of the following techniques will best help reduce the severity of this attack?
Answer : A
Which of the following is considered to be the most secure default firewall policy, yet usually causes the most work from an administrative perspective?
Answer : B