Topic 1, Exam Pool A
Developers at your company are creating a web application which wil be available for use by
anyone on the Internet, The developers have taken the approach of implementing a Three-Tier
Architecture for the web application. The developers are now asking you which network should
the Presentation Tier (front- end web server) be placed in?
A. isolated vlan network
B. Mesh network
C. DMZ network
D. Internal network
In Wireshark, the packet bytes panes show the data of the current packet in which format?
B. ASCII only
Company XYZ has asked you to assess the security of their perimeter email gateway. From
your office in New York, you craft a specially formatted email message and send it across the
Internet to an employee of Company XYZ. The employee of Company XYZ is aware of your
Your email message looks like this:
From: jim_mil email@example.com
To: michel firstname.lastname@example.org
Subject: Test message
Date: 4/3/2017 14:37
The employee of Company XYZ receives your email message. This proves that Company
XYZ's email gateway doesn't prevent what?
A. Email Phishing
B. Email Masquerading
C. Email Spoofing
D. Email Harvesting
When tuning security alerts, what is the best approach?