Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Research: Please explain in-detail the typically traffic flow from your browser to a web site that uses a trusted certificate (https). Please include firewall rules,

image text in transcribed

image text in transcribedimage text in transcribed

Research: Please explain in-detail the typically traffic flow from your browser to a web site that uses a trusted certificate (https). Please include firewall rules, and Intrusion Detection System (IDS) and the protocols and ports that are utilized in this kind of structure. Please also provide 3 examples of how the NIST framework is used with this example. Be very thorough with your terminology and provide detailed responses Questions: 1) You are troubleshooting some anomalies with network communication on your network. You notice that some communication isn't taking the expected or most efficient route to the destination. Which layer of the OSI model you should troubleshoot? 2) Your company uses VolP for internal telephone calls. You are deploying a new intrusion detection system and need to capture traffic related to internal telephone calls only. Which protocol should you capture? 3) You are performing a security audit for a customer. During the audit, you find several instances of users gaining access to data without going through a formal access approval process. As part of the remediation, you recommend establishing a formal access approval process. Which role should you list to approve policies that dictate which users can gain access to data? 4) Which statement below is accurate about the reasons to implement a layered security architecture? a. A layered security approach is not necessary when using COTS products. 4) Which statement below is accurate about the reasons to implement a layered security architecture? a. A layered security approach is not necessary when using COTS products. b. A good packet-filtering router will eliminate the need to implement a layered security architecture. c. A layered security approach is intended to increase the work -factor for an attacker. d. A layered approach doesn't really improve the security postive of the organization. 5) Which choice below is an incorrect description of a control? a. Detective controls discover attacks and trigger preventative or corrective controls. b. Corrective controls reduce the likelihood of a deliberate attack. c. Corrective controls reduce the effect of an attack. d. Controls are the countermeasures for vulnerabilities. 6) Which question below is NOT accurate regarding the process of risk assessment? a. The likelihood of impact of a threat must be determined as an element of the risk assessment. b. The level of impact of a threat must be determined as an element of the risk assessment. c. Risk assessment is the final result of the risk management methodology. d. Risk Assessment is the final result of the risk management methodology. 7) Which choice below is NOT one of NIST's 33 IT security principles? a. Implement least privilege. b. Assume that external systems are insure. c. Totally eliminate any level of risk. d. Minimize the system elements to be trusted. 8) Which choice below BEST describes the difference between the System Owner and the Information Owner? a. There is a one-to-one relationship between system owners and information owners. b. One system could have multiple information owners. c. The information Owner is responsible for defining the system's operating parameters. d. The System Owner is responsible for establishing the rules for appropriate use of the information. 9) Which choice below is an accurate statement about standards? a. Standards are the high-level statements made by senior management in support of information systems security. b. Standards are the first element created in an effective security policy program. c. Standards are used to describe how policies will be implemented within an organization. d. Standards are senior management's directives to create a computer security program. 10) What is the MOST accurate definition of a safeguard? 10) What is the MOST accurate definition of a safeguard? a. A guideline for policy recommendations b. A step-by-step instructional procedure c. A control designed to counteract a threat d. A control designed to counteract an asset

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access with AI-Powered Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Students also viewed these Databases questions

Question

Write a Python program to check an input number is prime or not.

Answered: 1 week ago