Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Please answer ALL the questions carefully. Thanks organization's IT manager is implementing some new controls related to the secure 44- An management and configuration of

Please answer ALL the questions carefully. Thanks

image text in transcribed

organization's IT manager is implementing some new controls related to the secure 44- An management and configuration of networking equipment within the production architectures. One of the controls requires log files to be stored away from the network perimeter and secured against unauthorized modification. Which of the following would BEST provide the capability required to the address this control? A) File integrity monitor B) SIEM C) DMZ D) Local RAID drive 51- A Security technician is reviewing a new vendor's practices for a project, but the vendors only supply SLA your documentation. Which of the following should the security technician request to understand the vendor's adherence own policies? A) Controls data audits B) Entry log audits C) Access log audits D) Security log audits 52- A company has given laptops to all retail salespeople. The sales staff operates in an open showroom that is often filled with the customers. The laptops connect over the Internet to corporate headquarters and accessing this information if they are left unattached. Additionally, there have been several issues of malware bypassing traditional antivirus and anti Malware countermeasure and infecting the laptops. The security teams have determined that a vector of these infections have all been through buffer overflow attacks on a web browsers plugin. Management ask management has asked to the security team to help prevent this to help prevent the security team to help prevent this security risk while maintaining employee's access to the Internet. Which of the following security measures would BEST fulfill those requirements? (Select two answers) A) install cable locks on the laptops B) Implement full disk encryption on the laptops. C) Implement a five-minute lockout policy D) Enable DEP and ASLR on the laptops' OSs. E) Install a HIDS on the salespeople's laptops F) Use an application blacklist on the laptops 53- The company employs a firewall to protect its internal network. An internal router resides directly behind the firewall and it's used to segment traffic to different subnets. Which of the following terms MOST accurately describes the use of multiple devices in layers and to protect a network? A) Zoning B) Defense-in-depth C) Logical segmentation D) Network hardening

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Data Management Databases And Organizations

Authors: Richard T. Watson

6th Edition

1943153035, 978-1943153039

More Books

Students also viewed these Databases questions

Question

Provide examples of Dimensional Tables.

Answered: 1 week ago