Answered step by step
Verified Expert Solution
Question
1 Approved Answer
Please solve All the Questions carefully OR do not answer anything someone else will... Thanks in advance 6- A security engineer is deploying a protective
Please solve All the Questions carefully OR do not answer anything someone else will... Thanks in advance
6- A security engineer is deploying a protective tool on a critical, isolated network segment where patching and uploading are slowed by the requirements for thorough testing. Which of the following is the BEST tool for deployment on this network segment? B) Heuristic IDS C) Signature-based IPS D) Behavior-based IDS 7- A security specialist is helping a developer test an application's security. After deploying new changes to the application, the specialist suggests testing them build with fuzzing software. The security specialist is trying to: A) discover and exploit input errors in the application B) locate forms in the application that are vulnerable to cross-site scripting C) test the presence of server-side buffer overflows. D) stress test the server with a large number of SQL injection queries 8- A one-time secure connection is needed to provide transport security for an application that uses a non-standard TCP-based protocol. Which of the following requires the applications to configured accordingly? A) SSH tunneling B) IPSec VPN C) SSLTLS D) SFTP 9- A company utilizes the Diffie-Hellman key exchange algorithm during the process of connecting clients to an IPSec VPN concentrator, Lately, the client software has started to warn that the key exchange process uses only a 768- bit models. The client software warns that future versions will only connect to VPN concentrator using a 1024 -bitch or higher. Which of the following should the security administrative do to eliminate this warning? A) configure the clients to use DSA key exchange rather than Diffie-Hellman. B) Select a different key exchange group for the tunnel C) Have the concentrator perform the key exchange twice for a 1538-bit effective modulus. D) Select a higher bit encryption algorithm like AES on both the clients and concentrator 10- Corporate policy mandates that data should not be stored with personal information, such as family photos Which of the following BE ST implements this poli A) Full disk encryption B) Asset tracking C) Application control D) Strong segmentationStep by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started