1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rina8888 [55]
3 years ago
12

A security technician is configuring a new firewall appliance for a production environment. The firewall must support secure web

services for client workstations on the 10.10.10.0/24 network. The same client workstations are configured to contact a server at 192.168.1.15/24 for domain name resolution.
Required:
What rules should the technician add to the firewall to allow this connectivity for the client workstations
Computers and Technology
1 answer:
Zielflug [23.3K]3 years ago
8 0

Answer:

Explanation:

Based on the information provided in the question, the best rules that the technician should add to the firewall would be the following

Permit 10.10.10.0/24 0.0.0.0 -p tcp --dport 443

Permit 10.10.10.0/24 192.168.1.15/24 -p udp --dport 53

This is because port 443 is used for "Secure webs services" while UDP port 53 is used for queries and domain name resolution. Both of which are the main configurations that the security technician needs to obtain.

You might be interested in
The chain of _____ documents that the evidence was under strict control at all times and no unauthorized person was given the op
Arturiano [62]

Answer:

custody.

I hope I could help

4 0
2 years ago
Crashing almost always accelerates the schedule while increasing project risk, whereas fast tracking almost always accelerates t
Ivahew [28]

Answer: False

Explanation: Because fast-tracking doesn’t involve additional resources, it’s usually best to start with this technique while Crashing requires careful planning to prevent “panic mode” among the project crews and to avoid acceleration claims.

4 0
3 years ago
If you wanted to buy a house that cost $150,000 and you knew you needed a down payment of five percent, how much would you need
andrew11 [14]

Answer:

7,500 is the answer

Explanation:

7,500 is 5% of 150,000

8 0
3 years ago
To avoid potential documentary errors and security leaks, the configuration of firewalls should not be documented unless strictl
Zolol [24]

Answer: False

Explanation:

 The given statement is false, as the configuration of the firewall, operational and administration procedure must be documented.

The configuration of multiple firewall are identical and the integrity and also performance of the configuration firewall files are check on the regularly bases.

It is basically used to avoid the security leaks and the documentation errors so it is necessary that it should be check regularly so that it can easily implement without any interrupt occurrence.

8 0
3 years ago
Jenny needs to record the names of 30 students, write down the subjects they studied, and note their grades in each subject afte
lidiya [134]

Answer:

<em>The </em><em>answer </em><em>is </em><em>(</em><em>A)</em>

Explanation:

Double-click both the worksheet tabs one at a time and then enter the new names.

6 0
2 years ago
Other questions:
  • Given main(), define the Team class (in file Team.java). For class method getWinPercentage(), the formula is:teamWins / (teamWin
    15·1 answer
  • Using the flowchart below, what value when entered for Y will generate a mathematical error and prevent our flowchart from being
    14·1 answer
  • Information management examines the organizational resource of information and regulates its definitions, uses, value, and distr
    11·1 answer
  • A self-confident person knows that:
    13·1 answer
  • Why is the keyboard arranged in the QWERTY style?
    6·2 answers
  • Identify the layout in which you will be able to view and edit the header and footer
    12·1 answer
  • Which statement is NOT a rule for the data source for the mail merge?
    13·2 answers
  • The M:N relationship between STUDENT and CLASS must be divided into two 1:M relationships through the use of the ENROLL entity;
    10·2 answers
  • How does a Cloud-first strategy approach a client's migration to the Cloud?
    11·1 answer
  • What is computer code?<br> A. Java Script<br> B. XML<br> C. HTML<br> D. Any programming language
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!