312-50v13 문제 201

A sophisticated attacker targets your web server with the intent to execute a Denial of Service (DoS) attack.
His strategy involves a unique mixture of TCP SYN, UDP, and ICMP floods, using 'r' packets per second.
Your server, reinforced with advanced security measures, can handle 'h' packets per second before it starts showing signs of strain. If 'r' surpasses 'h', it overwhelms the server, causing it to become unresponsive. In a peculiar pattern, the attacker selects 'r' as a composite number and 'h' as a prime number, making the attack detection more challenging. Considering 'r=2010' and different values for 'h', which of the following scenarios would potentially cause the server to falter?

312-50v13 문제 202

A security analyst is performing an audit on the network to determine if there are any deviations from the security policies in place. The analyst discovers that a user from the IT department had a dial-out modem installed.
Which security policy must the security analyst check to see if dial-out modems are allowed?

312-50v13 문제 203

You are the chief cybersecurity officer at CloudSecure Inc., and your team is responsible for securing a cloudbased application that handles sensitive customer data. To ensure that the data is protected from breaches, you have decided to implement encryption for both data-at-rest and data-in-transit. The development team suggests using SSL/TLS for securing data in transit. However, you want to also implement a mechanism to detect if the data was tampered with during transmission. Which of the following should you propose?

312-50v13 문제 204

아래에 제시된 정의 중 은밀한 채널을 가장 잘 설명하는 것은 무엇입니까?

312-50v13 문제 205

This TCP flag instructs the sending system to transmit all buffered data immediately.