ChatGPT: Implementing a reverse server in the DMZ network (Option B): This helps to shield the internal network from direct exposure to the internet. The reverse server acts as an intermediary between the internal web server and external users, reducing the risk of attacks reaching sensitive internal resources.
Moving the web server to the external network (Option E): By placing the web server on the external network (like a demilitarized zone, DMZ), it is isolated from the internal network and better protected from attacks aimed at internal systems.
The two steps that mitigate attacks on the webserver from the Internet are:
A. Create an ACL on the firewall to allow only TLS 1.3: Transport Layer Security (TLS) is a protocol that provides secure communication between web servers and clients over the internet. By creating an Access Control List (ACL) on the firewall to allow only TLS 1.3, the web server can be configured to only accept secure connections from clients. This helps to protect against attacks that try to intercept or eavesdrop on communications.
B. Implement a reverse server in the DMZ network: A reverse proxy server acts as an intermediary between the internet and the web server. It receives all incoming traffic and then forwards it to the web server. By implementing a reverse server in the DMZ network, the web server can be protected from direct exposure to the internet. The reverse proxy server can perform functions such as filtering traffic, caching data, and providing an additional layer of security by masking the web server's IP address.
Create an ACL on the firewall to allow only TLS 1.3
Implement a proxy server in the DMZ network not sure why they mentioned reverse server...
AB is correct
https://resources.infosecinstitute.com/topic/what-is-enumeration/
Enumeration is defined as a process which establishes an active connection to the target hosts to discover potential attack vectors in the system, and the same can be used for further exploitation of the system.
Only allowing TLS 1.3 can mitigate attacks, the proxy server can also help. C might cause issues for internal users, and D doen't do anything to mitigate attacks. Ans is: A.B.
Yes Its possible https://www.cisco.com/c/en/us/td/docs/security/firepower/660/configuration/guide/fpmc-config-guide-v66/getting_started_with_ssl_rules.html
upvoted 1 times
...
...
...
This section is not available anymore. Please use the main Exam Page.350-201 Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
archbbo
1 month, 3 weeks agomarceus
2 months, 3 weeks agoDrVoIP
8 months, 3 weeks agoTOLU1985
1 year, 1 month agokyle942
1 year, 1 month agoTOLU1985
1 year, 1 month agojaciro11
1 year, 2 months agoAlphaOne1
1 year, 4 months agoCiscoTester
1 year, 11 months agochongchangchi
1 year, 7 months agojaciro11
1 year, 2 months ago