During your setup of ISA you know that there is an interface which you don't want ISA to filter, how do you make sure ISA will
ignore traffic for the interface?
Answer : D
Which two of the following are factors that must be considered in determining the likelihood of occurrence during a risk analysis
review?
Answer : C, D
While configuring your ISS Internet Scanner to run in your network, you have decided to check for a specific Denial of Service
vulnerability that may be present. You have decided to let the users of the network know about the upcoming scan. What is the reason
you would inform all the users of such a scan?
Answer : B
The network you are managing has just had a new ISA server installed as the Firewall. You have been given the responsibility of
managing this new piece of equipment. During the configuration of this machine, you wish to create a new Protocol Rule. Which of
the following are the two different types of rules you may create?
Answer : B, E
Recently, you have seen an increase in intrusion attempts and in network traffic. You decide to use Snort to run a packet capture
and analyze the traffic that is present. Looking at the example, what type of traffic did Snort capture in this log file?
Answer : A
Which of the following best describes the Total Replacement Model?
Answer : C
You are the firewall administrator at your company and the network administrators have decided to implement a VPN solution
that will use L2TP. Which port or ports would you need to allow through the firewall to allow the L2TP traffic to reach the VPN
server inside your network from a remote client?
Answer : C