Question 116
In _______ mechanism, the system or application sends log records either on the local disk or over the network.
Question 117
Which of the following protocols is used for inter-domain multicast routing and natively supports "source-specific multicast" (SSM)?
Question 118
Which of the following tool is used for passive attacks to capture network traffic?
Question 119
Which of the following steps are required in an idle scan of a closed port?
Each correct answer represents a part of the solution. Choose all that apply.
Question 120
Larry is responsible for the company's network consisting of 300 workstations and 25 servers. After using a hosted email service for a year, the company wants to control the email internally. Larry likes this idea because it will give him more control over the email. Larry wants to purchase a server for email but does not want the server to be on the internal network due to the potential to cause security risks. He decides to place the server outside of the company's internal firewall. There is another firewall connected directly to the Internet that will protect traffic from accessing the email server. The server will be placed between the two firewalls. What logical area is Larry putting the new email server into?