subject
Computers and Technology, 24.03.2021 17:20 pssluke

The application team within a company is asking the security team to investigate why its application is slow after an upgrade. The source of the team's application is 10.13.136.9, and the destination IP is 10.17.36.5. The security analyst pulls the logs from the endpoint security software but sees nothing is being blocked. The analyst then looks at the UTM firewall logs and sees the following: Session Source Destination Protocol Port Action IPS DoS
12699 10.13. 136.9 10.17.36. 5 TCP 80 Allow Yes No
12699 10.13. 136.9 10.17. 36.5 TCP 443 Allow Yes No
12699 10.13. 136.9 10.17.36. 5 TCP 1433 Deny Yes No
12719 10.13.136. s 10.17.36. 5 TCP 87 Deny Yes No
12719 10.13. 136.9 10.17.36.5 TCP 88 Allow Yes No
12719 10.13. 136.9 10.17.36.5 TCP 636 Allow Yes No
12899 10.13. 126.6 10.17.36.5 UDP 9877 Deny No No

Which of the following should the security analyst request NEXT based on the UTM firewall analysis?
a. Request the application team to allow TCP port 87 to listen on 10.17.36.5.
b. Request the network team to open port 1433 from 10.13.136.9 to 10.17.36.5.
c. Request the network team to turn of IPS for 10.13.136.8 going to 10.17.36.5.
d. Request the application team to reconfigure the application and allow RPC communication.

ansver
Answers: 2

Another question on Computers and Technology

question
Computers and Technology, 23.06.2019 14:00
How are stop motion special effects in animated films created
Answers: 1
question
Computers and Technology, 24.06.2019 01:30
Write a program that asks the user to enter the name of an input file. if the file does not exist, the program should prompt the user to enter the file name again. if the user types quit in any uppercase/lowercase combinations, then the program should exit without any further output.
Answers: 3
question
Computers and Technology, 24.06.2019 10:00
Each time you save a document, you will need to type in the file type in which it should be saved you can select the save button to save it with the same file name if it has been previously saved you will need to select the location to save the file you will need to use the save as dialog box
Answers: 1
question
Computers and Technology, 24.06.2019 21:30
Suppose a router has built up the routing table shown in the table. subnet number 128.96.39.00 28.96.39.128 128.96.40.00 192.4.153.0 default) subnet mask 255.255.255.128 255.255.255.128 255.255.255.128 255.255.255.192 nexthop interface 0 interface 1 r2 r3 r4. the router can deliver packets directly over interfaces 0 and 1, or it can forward packets to routers r2, r3, or r4. describe what the router does with a packet addressed to each of the following destinations: (a) 128.96.39.10 (b) 128.96.40.12 (c) 128.96.40.151 (d) 192.4.153.17 (e) 192.4.153.90
Answers: 3
You know the right answer?
The application team within a company is asking the security team to investigate why its application...
Questions
question
English, 08.06.2021 19:20
question
Mathematics, 08.06.2021 19:20
question
Mathematics, 08.06.2021 19:20
question
Computers and Technology, 08.06.2021 19:20
question
Mathematics, 08.06.2021 19:20
question
Chemistry, 08.06.2021 19:20
question
Mathematics, 08.06.2021 19:20
Questions on the website: 13722359