Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Pease answer ALL questions carefully 19- ransomware is detected on a database administrator's workstation. Which of the following forensic procedures should be performed FIRST to

Pease answer ALL questions carefully

image text in transcribed

19- ransomware is detected on a database administrator's workstation. Which of the following forensic procedures should be performed FIRST to mitigate the threat? A) Capture volatile memory B) Create a system image C) Isolate the workstation D) Review network traffic logs 20- A Security administrator wants to implement a solution to encrypt all communications between the company's servers and client workstations. The solution must account for protocols at Layers 4 through 7 of the OSI model Which of the following should be implemented? A) iSCSI B) SSH C) IPSec D) SCP 21- which of the following is susceptible on an attack that can obtain the wireless password by brute-forcing a four- digit PIN followed by three-digit PIN A) WPA B) WPS C) WEP D) WPA2 22- A company implemented a new wireless network that supports PEAP, and EAP- FAST, which authenticate users with their regular usernames and passwords for the wired network. During testing, users were unable to connect to the wireless network. Their devices failed to associate with the access point, and uses received a message that the association was untrusted. Which of the following should the company do to remedy this wireless network issue? A) Require users to register their wireless card MAC addresses with IT support before trying to connect the system. B) Allow users to authenticate to the local Ads rather than utilizing a back-end identity store. C) Utilize a commercially available, CA-issued certificate to be used during the client connection process. D) Disseminate a preshared key for use during the AP association phase of the connection 23- A Development company intends to market its OS project towards high security users. When designing the kernel's security architecture, the development team begins to map out specific object and determine which subject will need to be able to access those objects. The team defines specific security domains that provided the context for this access control. Which of the following represents the access control object the development team is trying to achieve? A) MAC B) Rule-based access control C) DAC D) Role-based access control

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Oracle Database 10g Insider Solutions

Authors: Arun R. Kumar, John Kanagaraj, Richard Stroupe

1st Edition

0672327910, 978-0672327919

More Books

Students also viewed these Databases questions

Question

Q: How do employees communicate their opinions to management?

Answered: 1 week ago

Question

How would we like to see ourselves?

Answered: 1 week ago

Question

How can we visually describe our goals?

Answered: 1 week ago

Question

What metaphors might describe how we work together?

Answered: 1 week ago