subject
Computers and Technology, 24.03.2021 17:20 pssluke

The application team within a company is asking the security team to investigate why its application is slow after an upgrade. The source of the team's application is 10.13.136.9, and the destination IP is 10.17.36.5. The security analyst pulls the logs from the endpoint security software but sees nothing is being blocked. The analyst then looks at the UTM firewall logs and sees the following: Session Source Destination Protocol Port Action IPS DoS
12699 10.13. 136.9 10.17.36. 5 TCP 80 Allow Yes No
12699 10.13. 136.9 10.17. 36.5 TCP 443 Allow Yes No
12699 10.13. 136.9 10.17.36. 5 TCP 1433 Deny Yes No
12719 10.13.136. s 10.17.36. 5 TCP 87 Deny Yes No
12719 10.13. 136.9 10.17.36.5 TCP 88 Allow Yes No
12719 10.13. 136.9 10.17.36.5 TCP 636 Allow Yes No
12899 10.13. 126.6 10.17.36.5 UDP 9877 Deny No No

Which of the following should the security analyst request NEXT based on the UTM firewall analysis?
a. Request the application team to allow TCP port 87 to listen on 10.17.36.5.
b. Request the network team to open port 1433 from 10.13.136.9 to 10.17.36.5.
c. Request the network team to turn of IPS for 10.13.136.8 going to 10.17.36.5.
d. Request the application team to reconfigure the application and allow RPC communication.

ansver
Answers: 2

Another question on Computers and Technology

question
Computers and Technology, 23.06.2019 03:10
Acomputer has a two-level cache. suppose that 60% of the memory references hit on the first level cache, 35% hit on the second level, and 5% miss. the access times are 5 nsec, 15 nsec, and 60 nsec, respectively, where the times for the level 2 cache and memory start counting at the moment it is known that they are needed (e.g., a level 2 cache access does not even start until the level 1 cache miss occurs). what is the average access time?
Answers: 1
question
Computers and Technology, 23.06.2019 11:00
How should you specify box sizes on a web page if you want the boxes to vary according to the font size of the text they contain? a. in pixels b. in inches c. as percentages d. in em units
Answers: 2
question
Computers and Technology, 23.06.2019 15:00
Visually impaired individuals generally rely on the for navigation. thus, designers need to ensure that mouse-specific inputs, such as pointing, clicking, and hovering, can be done without a mouse.
Answers: 1
question
Computers and Technology, 23.06.2019 17:10
Ac++an of of pi. in , pi is by : pi = 4 ā€“ 4/3 + 4/5 ā€“ 4/7 + 4/9 - 4/11 + 4/13 - 4/15 + 4/17 . ., to pi (9 ). , if 5 to pi,be as : pi = 4 - 4/3 + 4/5 - 4/7 + 4/9 = 4 ā€“ 1. + 0.8 - 0. + 0. = 3.. atoofbe to pi?
Answers: 2
You know the right answer?
The application team within a company is asking the security team to investigate why its application...
Questions
question
Mathematics, 20.01.2020 05:31
question
History, 20.01.2020 05:31