Learn about and implement security best practices for network environments.
Link- https://tryhackme.com/room/introtosecurityarchitecture
How many trunks are present in this configuration?
4
What is the VLAN tag ID for interface eth12?
30
From the above table, what zone would a user connecting to a public web server be in?
external
From the above table, what zone would a public web server be in?
dmz
From the above table, what zone would a core domain controller be placed in?
restricted
According to the corresponding ACL policy, will the first packet result in a drop or accept?
accept
According to the corresponding ACL policy, will the second packet result in a drop or accept?
drop
What is the flag found after filling in all blanks on the static site?
Does SSL inspection require a man-in-the-middle proxy? (Y/N)
y
What platform processes data sent from an SSL proxy?