Free IISFA II0-001 Exam Braindumps

Active shunting is the process in which an malicious attack is detected and the traffic is:

  1. is routed, dynamically, through a CVP server for content filtering
  2. is a automatically squelched at the source of the attack using protocol squelching.
  3. is illegal due to its intrusive nature.
  4. is blocked via dynamic ACLs in firewall or infrastructure divides.

Answer(s): D



In order to prevent footprinting of an environment, one method that is effective is:

  1. Footprint shunting
  2. Network address translation at a perimeter security device
  3. ISPs monitoring and filtering footprinting activity
  4. None of the above

Answer(s): B



Because of overlapping security domains, it is impossible to have two perimeter security devices (firewalls) in successive layers.

  1. True
  2. False

Answer(s): B



The "Stealth Rule" in a perimeter security device prevents it from being footprinted.

  1. True
  2. False

Answer(s): A



Viewing page 10 of 58
Viewing questions 46 - 50 out of 229 questions



Post your Comments and Discuss IISFA II0-001 exam prep with other Community members:

II0-001 Exam Discussions & Posts