1.
HIDS local attack mitigation is performed on what devices within the SAFE SMR small network corporate Internet module?
2.
How are trust exploitation attacks mitigated in the SAFE SMR small network corporate Internet module?
3.
You are the administrator at Certkiller Inc and you are implementing a small filtering router. As an alternative design in the SAFE SRM small network campus module, a small filtering router can be placed between the rest of the network and which devices?
4.
How are packet sniffer attacks mitigated in the SAFE SMR small network campus module?
5.
What can be implemented in the SAFE SMR small network campus module to mitigate trust exploitation attacks between devices?
6.
How are port redirection attacks mitigated in the SAFE SMR small network campus module?
7.
The security team at Certkiller Inc. is working on implementing IOS firewall in their SAFE SMR small network design. What is the primary function of the IOS firewall in the SAFE SMR small network design?
8.
Jason is the security administrator at Certkiller Inc. and wants to know which is true with regard to creating an RPC entry with the NFS program number?
9.
What is the function of SMTP inspection?
10.
How does Java applet filtering distinguish between trusted and untrustedapplets?