Question 86

A firewall administrator is implementing a rule that directs HTTP traffic to an internal server listening on a non-standard socket Which of the following types of rules is the administrator implementing?
  • Question 87

    Which of the following is used to provide disaster recovery capabilities to spin up an critical devices using internet resources?
  • Question 88

    The network administrator is informed that a user's email password is frequently hacked by brute-force programs. Which of the following policies should the network administrator implements to BEST mitigate this issue? (Choose two.)
  • Question 89

    Which of the following services can provide data storage, hardware options, and scalability to a third-party company that cannot afford new devices?
  • Question 90

    A network technician needs to ensure outside users are unable to telnet into any of the servers at the datacenter. Which of the following ports should be blocked when checking firewall configuration?