Free II0-001 Exam Braindumps

Active shunting is the process in which an malicious attack is detected and the traffic is:

  1. is routed, dynamically, through a CVP server for content filtering
  2. is a automatically squelched at the source of the attack using protocol squelching.
  3. is illegal due to its intrusive nature.
  4. is blocked via dynamic ACLs in firewall or infrastructure divides.

Answer(s): D



In order to prevent footprinting of an environment, one method that is effective is:

  1. Footprint shunting
  2. Network address translation at a perimeter security device
  3. ISPs monitoring and filtering footprinting activity
  4. None of the above

Answer(s): B



Because of overlapping security domains, it is impossible to have two perimeter security devices (firewalls) in successive layers.

  1. True
  2. False

Answer(s): B



The "Stealth Rule" in a perimeter security device prevents it from being footprinted.

  1. True
  2. False

Answer(s): A






Post your Comments and Discuss IISFA II0-001 exam with other Community members:

II0-001 Discussions & Posts