A company recently added a DR site and is redesigning the network. Users at the DR site are having
issues browsing websites.
INSTRUCTIONS
Click on each firewall to do the following:
Deny cleartext web traffic.
Ensure secure management protocols are used.
Resolve issues at the DR site.
The ruleset order cannot be modified due to outside constraints.
If at any time you would like to bring back the initial state of the simulation, please click the Reset All
button.
Answer: See
explanation below.
Explanation:
Firewall 1:
DNS Rule – ANY - - > ANY - - > DNS - - > PERMIT
HTTPS Outbound – 10.0.0.1/24 - - > ANY - - > HTTPS - - > PERMIT
Management – ANY - - > ANY - - > SSH - - > PERMIT
HTTPS Inbound – ANY - - > ANY - - > HTTPS - - > PERMIT
HTTP Inbound – ANY - - > ANY - - > HTTP - - > DENY
Firewall 2:
Firewall 3:
DNS Rule – ANY - - > ANY - - > DNS - - > PERMIT
HTTPS Outbound – 192.168.0.1/24 - - > ANY - - > HTTPS - - > PERMIT
Management – ANY - - > ANY - - > SSH - - > PERMIT
HTTPS Inbound – ANY - - > ANY - - > HTTPS - - > PERMIT
HTTP Inbound – ANY - - > ANY - - > HTTP - - > DENY
Question No 2
DRAG DROP
A security engineer is setting up passwordless authentication for the first time.
INSTRUCTIONS
Use the minimum set of commands to set this up and verify that it works. Commands cannot be
reused.
If at any time you would like to bring back the initial state of the simulation, please click the Reset All
button.
Answer:
Explanation:
0
Question No 3
HOTSPOT
Select the appropriate attack and remediation from each drop - down list to label the corresponding
attack with its remediation.
INSTRUCTIONS
Not all attacks and remediation actions will be used.
If at any time you would like to bring back the initial state of the simulation, please click the Reset All
button.
1
Answer:
Explanation:
2
Question No 4
Which of the following will MOST likely adversely impact the operations of unpatched traditional
programmable - logic controllers, running a back - end LAMP server and OT systems with human -
management interfaces that are accessible over the Internet via a web interface? (Choose two.)
Question No 5
A company recently transitioned to a strictly BYOD culture due to the cost of replacing lost or
damaged corporate - owned mobile devices. Which of the following technologies would be BEST to
balance the BYOD culture while also protecting the company’s data?