Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Please answer ALL the questions carefully. Thanks 58- Ann, a security analysis, is observing a current attack in progress from a remade IP address. She

Please answer ALL the questions carefully. Thanks

image text in transcribed

58- Ann, a security analysis, is observing a current attack in progress from a remade IP address. She is not concerned with the attack but will study the attack method and write a new IDS signature. Which of the following is the MOST likely target of this attack? A) Proxy server B) Bastion host C) sensitive system D) Honeypot 59- As part of regulatory compliance effort, a system administrator has been asked to eliminate the user of SSL in favor of TLS. However, after taking steps to remediate, a vulnerability scan indicates the server is vulnerability to the POODLE attack. Which of the following likely cause this to occur? A) The POODLE attack only affects HTTP traffic B) The WAF was not reconfigured to scan for TLS traffic in lieu of SSL traffic C) The server is using a self-signed SSL certificate D) Although TLS was enabled 60- A small contracting firm is working with a customer to sign an ISA and MOU but is unable to adhere to the following security parameters in the agreement: >Antivirus must be installed on all hosts. >>All traffic must pass through a firewall. >>All systems must have the latest security patches installed. A VPN shall be established for all data transmission The firm currently has laptop is connected to a WAP, which was provided by the ISP. A security analyst was hired to find the most secure method to became complement with their parameters of the ISA and MOU. Which of the following should the security analyst recommended? A) Turn on host - based firewalls and instill VPN clients on the hosts and a centrally managed patch deployment system B) Purchase a UTM, install MDM on all hosts, and ensure antivirus is installed and running on all host. C) Request a VPN and enhanced WAP from the ISP, install antivirus on all hosts, and allow automatic updates is on OS D) Install a VPN clients and antivirus software on each host and allow automatic updates and OS 61- A hospital uses legacy medical devices that are incompatible with OS upgrades. Which of the following should be used to secure this device from unauthorized use by internal employees? A) Proxy server B) network segmentation C) Intrusion prevention system D) Web application firewall

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

MongoDB Applied Design Patterns Practical Use Cases With The Leading NoSQL Database

Authors: Rick Copeland

1st Edition

1449340040, 978-1449340049

More Books

Students also viewed these Databases questions

Question

=+2 Why are so many countries bothered by their brain drains?

Answered: 1 week ago