Free II0-001 Exam Braindumps (page: 12)

Page 11 of 58

A rule that allows any traffic from the trusted network through to untrusted networks is a security risk because:

  1. It will allow a trojan program within the trusted network to operate.
  2. The firewall will perform poorly and violate the Availability principle of information security.
  3. Trusted networks should always be treated the same as untrusted networks.
  4. This is not a security risk.

Answer(s): A



For many ISPs, placing a network protocol sniffer in their infrastructure allows them to be very effective in support law enforcement during an investigation.

  1. True
  2. False

Answer(s): B



A syslog server and a protocol sniffer perform the same basic function.

  1. True
  2. False

Answer(s): B



When investigating a malicious attack sourced from the Internet, the investigator would look for forensic evidence in:

  1. The point of entry firewall log
  2. The application logs of the target system
  3. The IDS log
  4. All of the above

Answer(s): D






Post your Comments and Discuss IISFA II0-001 exam with other Community members:

II0-001 Discussions & Posts