Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Please solve All the Questions carefully OR do not answer anything someone else will... Thanks in advance 6- A security engineer is deploying a protective

Please solve All the Questions carefully OR do not answer anything someone else will... Thanks in advance

image text in transcribed

6- A security engineer is deploying a protective tool on a critical, isolated network segment where patching and uploading are slowed by the requirements for thorough testing. Which of the following is the BEST tool for deployment on this network segment? B) Heuristic IDS C) Signature-based IPS D) Behavior-based IDS 7- A security specialist is helping a developer test an application's security. After deploying new changes to the application, the specialist suggests testing them build with fuzzing software. The security specialist is trying to: A) discover and exploit input errors in the application B) locate forms in the application that are vulnerable to cross-site scripting C) test the presence of server-side buffer overflows. D) stress test the server with a large number of SQL injection queries 8- A one-time secure connection is needed to provide transport security for an application that uses a non-standard TCP-based protocol. Which of the following requires the applications to configured accordingly? A) SSH tunneling B) IPSec VPN C) SSLTLS D) SFTP 9- A company utilizes the Diffie-Hellman key exchange algorithm during the process of connecting clients to an IPSec VPN concentrator, Lately, the client software has started to warn that the key exchange process uses only a 768- bit models. The client software warns that future versions will only connect to VPN concentrator using a 1024 -bitch or higher. Which of the following should the security administrative do to eliminate this warning? A) configure the clients to use DSA key exchange rather than Diffie-Hellman. B) Select a different key exchange group for the tunnel C) Have the concentrator perform the key exchange twice for a 1538-bit effective modulus. D) Select a higher bit encryption algorithm like AES on both the clients and concentrator 10- Corporate policy mandates that data should not be stored with personal information, such as family photos Which of the following BE ST implements this poli A) Full disk encryption B) Asset tracking C) Application control D) Strong segmentation

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Beginning Databases With PostgreSQL From Novice To Professional

Authors: Richard Stones, Neil Matthew

2nd Edition

1590594789, 978-1590594780

More Books

Students also viewed these Databases questions