A user receives a phone call at home from someone claiming to be from their company’s IT help desk. The help desk person wants to verify their username and password to ensure that the user’s account has not been compromised. Which of the following attacks has just occurred?
Which of the following will BEST block a host from accessing the LAN on a network using static IP addresses?
A network technician has configured a new firewall with a rule to deny UDP traffic. Users have reported that they are unable to access Internet websites. The technician verifies this using the IP address of a popular website. Which of the following is the MOST likely cause of the error?
Which of the following firewall rules will block destination telnet traffic to any host with the source IP address 1.1.1.2/24?