Answered step by step
Verified Expert Solution
Question
1 Approved Answer
Please answer ALL the questions carefully. Thanks organization's IT manager is implementing some new controls related to the secure 44- An management and configuration of
Please answer ALL the questions carefully. Thanks
organization's IT manager is implementing some new controls related to the secure 44- An management and configuration of networking equipment within the production architectures. One of the controls requires log files to be stored away from the network perimeter and secured against unauthorized modification. Which of the following would BEST provide the capability required to the address this control? A) File integrity monitor B) SIEM C) DMZ D) Local RAID drive 51- A Security technician is reviewing a new vendor's practices for a project, but the vendors only supply SLA your documentation. Which of the following should the security technician request to understand the vendor's adherence own policies? A) Controls data audits B) Entry log audits C) Access log audits D) Security log audits 52- A company has given laptops to all retail salespeople. The sales staff operates in an open showroom that is often filled with the customers. The laptops connect over the Internet to corporate headquarters and accessing this information if they are left unattached. Additionally, there have been several issues of malware bypassing traditional antivirus and anti Malware countermeasure and infecting the laptops. The security teams have determined that a vector of these infections have all been through buffer overflow attacks on a web browsers plugin. Management ask management has asked to the security team to help prevent this to help prevent the security team to help prevent this security risk while maintaining employee's access to the Internet. Which of the following security measures would BEST fulfill those requirements? (Select two answers) A) install cable locks on the laptops B) Implement full disk encryption on the laptops. C) Implement a five-minute lockout policy D) Enable DEP and ASLR on the laptops' OSs. E) Install a HIDS on the salespeople's laptops F) Use an application blacklist on the laptops 53- The company employs a firewall to protect its internal network. An internal router resides directly behind the firewall and it's used to segment traffic to different subnets. Which of the following terms MOST accurately describes the use of multiple devices in layers and to protect a network? A) Zoning B) Defense-in-depth C) Logical segmentation D) Network hardeningStep by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started