Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Please answer the ALL the questions carefully. Thanks 26- a Chief Executive Officer(CEO) tells a security technician that preventive, detective, and connective controls are needed

Please answer the ALL the questions carefully. Thanks

image text in transcribed

26- a Chief Executive Officer(CEO) tells a security technician that preventive, detective, and connective controls are needed to protect sensitive non-time critical information stored in the financial department. The financial department is located on the ground floor of the publicly accessible building and shares a common network with the sales department. Which of the following would be the most economical and would meet the CEOs requirements? A) Install firewall to segregate finance from that sales network, please alarm the mation detectors on the ground floor, and securely back up finance data B) Install firewall to segregate finance from that sales network, place security guards in the ground foyer, and provision a cold site for data redundancy C) Install HIDS on the finance department's PCs, place alarm the motion detectors on the ground floor, and provision a cold site for data redundancy D) install an IDS to detect malicious users, place security guards in the ground foyer, and provision a hot site for data redundancy 27- A Supplier frequently requests immediate payment via wire transfer. the account and routing numbers are transmitted via email. To validate into integrity of the message, the supplier create a SHA- 256 hash of the message contains and appends it to the email. Despite these security measures, a malicious third party intercepted of the supplier's email and successfully replaced the amount and routing numbers. which of the following would best prevent unauthorized individuals from the forging email? A) Force TLS encryption on the SMTP server B) Use SPF validation for remote email domains C)Use an IP- based whitelist to confirm message authenticity D) Switch to a hashing algorithm with fewer collisions, such as SHA-512 28- A CERT team is investigating a possible server branch. After properly photographing the scene, the technician most investigate components of the device according to the order of the volatility. Which of the following displays the components in order from most volatility? 1- RAM 2- CPU cache 3- Hard disk 4- Swap file A) 1,2,3,4 B) 1,4,2,3 C) 2,1,4,3 D) 4,2,1,3 29- A network administrator has noticed a large amount of unknown traffic from several systems on the network traveling to two external locations. Up on investigating the distention of the traffic, it is determined that the external locations include an international bank's website and a command and control server identified by several antivirus companies. Which of the following malware types is MOST likely responsible for this behavior? B) botnet C) spyware D) Ransomware

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Professional Microsoft SQL Server 2014 Administration

Authors: Adam Jorgensen, Bradley Ball

1st Edition

111885926X, 9781118859261

More Books

Students also viewed these Databases questions

Question

To solve p + 3q = 5z + tan( y - 3x)

Answered: 1 week ago