Course Hero Logo

A remote user user1 is unable to reach a newly

Course Hero uses AI to attempt to automatically extract content from documents to surface to you and others so you can study better, e.g., in search results, to enrich docs, and more. This preview shows page 85 - 87 out of 87 pages.

A remote user (User1) is unable to reach a newly provisioned corporate windows workstation. The system administrator has been given the following log files fromthe VPN, corporate firewall and workstation host.Which of the following is preventing the remote user from being able to access the workstation?A.Network latency is causing remote desktop service request to time outB.User1 has been locked out due to too many failed passwordsC.Lack of network time synchronization is causing authentication mismatchesD.The workstation has been compromised and is accessing known malware sitesE.The workstation host firewall is not allowing remote desktop connectionsCorrect Answer:BSection: (none)ExplanationExplanation/Reference:QUESTION 175Which of the following is the appropriate network structure used to protect servers and services that must be provided to external clients without completelyeliminating access for internal users?A. NAC
B. VLANC. DMZD. SubnetCorrect Answer:CSection: (none)ExplanationExplanation/Reference:QUESTION 176An administrator has configured a new Linux server with the FTP service. Upon verifying that the service was configured correctly, the administrator has severalusers test the FTP service. Users report that they are able to connect to the FTP service and download their personal files, however, they cannot transfer new filesto the server.Which of the following will most likely fix the uploading issue for the users?A.Create an ACL to allow the FTP service write access to user directoriesB.Set the Boolean selinux value to allow FTP home directory uploadsC.Reconfigure the ftp daemon to operate without utilizing the PSAV modeD.Configure the FTP daemon to utilize PAM authentication pass through user permissionsCorrect Answer:ASection: (none)ExplanationExplanation/Reference:QUESTION 177A global gaming console manufacturer is launching a new gaming platform to its customers.Which of the following controls reduces the risk created by malicious gaming customers attempting to circumvent control by way of modifying consoles?A.Firmware version controlB.Manual software upgradesC.Vulnerability scanningD.Automatic updates
E.Network segmentationF.Application firewallsCorrect Answer:ADSection: (none)ExplanationExplanation/Reference:QUESTION 178An external contractor, who has not been given information about the software or network architecture, is conducting a penetration test. Which of the followingBEST describes the test being performed?A.Black boxB.White boxC.Passive reconnaissanceD.Vulnerability scanCorrect Answer:ASection: (none)ExplanationExplanation/Reference:
End of preview. Want to read all 87 pages?

Upload your study docs or become a

Course Hero member to access this document

Term
Fall
Professor
NoProfessor
Tags
Computer Security, analyst, security administrator, Extensible Authentication Protocol

Newly uploaded documents

Show More

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture