Answered step by step
Verified Expert Solution
Question
1 Approved Answer
Please answer the ALL the questions carefully. Thanks 26- a Chief Executive Officer(CEO) tells a security technician that preventive, detective, and connective controls are needed
Please answer the ALL the questions carefully. Thanks
26- a Chief Executive Officer(CEO) tells a security technician that preventive, detective, and connective controls are needed to protect sensitive non-time critical information stored in the financial department. The financial department is located on the ground floor of the publicly accessible building and shares a common network with the sales department. Which of the following would be the most economical and would meet the CEOs requirements? A) Install firewall to segregate finance from that sales network, please alarm the mation detectors on the ground floor, and securely back up finance data B) Install firewall to segregate finance from that sales network, place security guards in the ground foyer, and provision a cold site for data redundancy C) Install HIDS on the finance department's PCs, place alarm the motion detectors on the ground floor, and provision a cold site for data redundancy D) install an IDS to detect malicious users, place security guards in the ground foyer, and provision a hot site for data redundancy 27- A Supplier frequently requests immediate payment via wire transfer. the account and routing numbers are transmitted via email. To validate into integrity of the message, the supplier create a SHA- 256 hash of the message contains and appends it to the email. Despite these security measures, a malicious third party intercepted of the supplier's email and successfully replaced the amount and routing numbers. which of the following would best prevent unauthorized individuals from the forging email? A) Force TLS encryption on the SMTP server B) Use SPF validation for remote email domains C)Use an IP- based whitelist to confirm message authenticity D) Switch to a hashing algorithm with fewer collisions, such as SHA-512 28- A CERT team is investigating a possible server branch. After properly photographing the scene, the technician most investigate components of the device according to the order of the volatility. Which of the following displays the components in order from most volatility? 1- RAM 2- CPU cache 3- Hard disk 4- Swap file A) 1,2,3,4 B) 1,4,2,3 C) 2,1,4,3 D) 4,2,1,3 29- A network administrator has noticed a large amount of unknown traffic from several systems on the network traveling to two external locations. Up on investigating the distention of the traffic, it is determined that the external locations include an international bank's website and a command and control server identified by several antivirus companies. Which of the following malware types is MOST likely responsible for this behavior? B) botnet C) spyware D) RansomwareStep by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started