CEH v9 Question of the Week: Firewall Traffic

Jason asked his company’s firewall administrator to set the firewall to inspect all incoming traffic on ports 80 and 443 to ensure that no malicious data is getting into the network. Why is this request not possible? A. Firewalls cannot inspect traffic coming through port 443. B. Firewalls can only inspect outbound traffic. C. Firewalls cannot […]

Read more

CEH v9 Question of the Week: Same MAC Address

Paul has just finished setting up his wireless network and has enabled numerous security features such as changing the default SSID, enabling WPA encryption and enabling MAC filtering on his wireless router. Paul notices that when he uses his wireless connection, the speed is sometimes 54 Mbps and sometimes it is 24Mbps or less. Paul connects to his wireless router’s management utility and notices that a machine with an unfamiliar name is connected through his wireless connection. He checks the router’s logs and notices that the unfamiliar machine has the same MAC address as his laptop. What is Paul seeing here?

Read more