Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

** Please with an explanation if possible ** *Please answers all or leave it to another expert* Question #:1 A security administrator is creating a

** Please with an explanation if possible **

*Please answers all or leave it to another expert*

Question #:1

A security administrator is creating a risk assessment on BYOD. One of the requirements of the risk assessment is to address the following

Centrally managing mobile devices

Data loss prevention

Which of the following recommendations should the administrator include in the assessment? (Select TWO)

implement encryption.

implement hashing.

implement an MDM with mobile device hardening.

implement a VPN with secure connection in webmail.

implement and allow cloud storage features on the network.

-------------------------------------------------------------------------------------------------------------

Question #:2

Confidential corporate data was recently stolen by an attacker who exploited data transport protections. Which of the following vulnerabilities is the MOST likely cause of this data breach?

Resource exhaustion on the VPN concentrators

Weak SSL cipher strength

Improper input handling on the FTP site

Race condition on the packet inspection firewall

-------------------------------------------------------------------------------------------------------------

Question #:3

A security consultant is analyzing data from a recent compromise. The following data points are documented

Access to data on share drives and certain networked hosts was lost after an employee logged in to an interactive session as a privileged user.

The data was unreadable by any known commercial software.

The issue spread through the enterprise via SMB only when certain users accessed data.

Removal instructions were not available from any major antivirus vendor.

Which of the following types of malware is this example of?

RAT

Ransomware

Backdoor

Keylogger

Worm

------------------------------------------------------------------------------------------------------------- Question #:4 An organization has the following password policies:

Passwords must be at least 16 characters long. A password cannot be the same as any previous 20 passwords. Three failed login attempts will lock the account for five minutes. Passwords must have one uppercase letter, one lowercase letter, and one non-alphanumeric symbol.

A database server was recently breached, and the incident response team suspects the passwords were compromised. Users with permission on that database server were forced to change their passwords for that server. Unauthorized and suspicious logins are now being detected on a completely separate server. Which of the following is MOST likely the issue and the best solution?

Some users are reusing passwords for different systems; the organization should scan for password reuse across systems.

The organization has improperly configured single sign-on; the organization should implement a RADIUS server to control account logins.

User passwords are not sufficiently long or complex: the organization should increase the complexity and length requirements for passwords.

The trust relationship between the two servers has been compromised: the organization should place each server on a separate VLAN.

-------------------------------------------------------------------------------------------------------------

Question #:5

A coding error has been discovered on a customer-facing website. The error causes each request to return confidential PHI data for the incorrect organization. The IT department is unable to identify the specific customers who are affected. As a result, all customers must be notified of the potential breach. Which of the following would allow the team to determine the scope of future incidents?

Intrusion detection system

Database access monitoring

Application fuzzing

Monthly vulnerability scans

------------------------------------------------------------------------------------------------------------- Question #:6 Which of the following is a risk that is specifically associated with hosting applications in the public cloud?

Unsecured root accounts

Zero-day Shared tenancy

Insider threat

-------------------------------------------------------------------------------------------------------------

Question #:7 A security analyst wants to limit the use of USB and external drives to protect against malware. as well as protect les leaving a users computer. Which of the following is the BEST method to use?

Firewall

Router

Antivirus software

Data loss prevention

------------------------------------------------------------------------------------------------------------- Question #:8 A first responder needs to collect digital evidence from a compromised headless virtual host. Which of the following should the first responder collect FIRST?

Virtual memory

BIOS configuration

Snapshot

RAM

------------------------------------------------------------------------------------------------------------- Question #:9 An organization was recently compromised by an attacker who used a server certificate with the company's domain issued by an irrefutable CA. Which of the following should be used to mitigate this risk in the future?

OCSP

DNSSEC

Corticated pinning

Key escrow ------------------------------------------------------------------------------------------------------------- Question #:10

Which of the following would MOST likely support the integrity of a voting machine?

Asymmetric encryption

Blockchain

Transport Layer Security

Perfect forward secrecy

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

DATABASE Administrator Make A Difference

Authors: Mohciine Elmourabit

1st Edition

B0CGM7XG75, 978-1722657802

Students also viewed these Databases questions

Question

Identify language and structure problems

Answered: 1 week ago