A company firewall engineer has configured a new DMZ to allow public systems to be located away from the internal network. The engineer has three security zones set:Untrust (Internet) (Remote network = 217.77.88.0/24)DMZ (DMZ) (11.12.13.0/24)Trust (Intranet) (192.168.0.0/24)The engineer wants to configure remote desktop access from a fixed IP on the remote network to a remote desktop server in the DMZ. Which rule would best fit this requirement?
A circuit level gateway works at which of the following layers of the OSI Model?
Which of the following is a symmetric cryptographic standard?
A computer science student needs to fill some information into a secured Adobe PDF job application that was received from a prospective employer. Instead of requesting a new document that allowed the forms to be completed, the student decides to write a script that pulls passwords from a list of commonly used passwords to try against the secured PDF until the correct password is found or the list is exhausted.Which cryptography attack is the student attempting?
Which property ensures that a hash function will not produce the same hashed value for two different messages?
Which of the following is a hardware requirement that either an IDS/IPS system or a proxy server must have in order to properly function?