Which of the following will best help you ensure a database server can withstand a recently discovered vulnerability?
Which of the following will best help you ensure a database server can withstand a recently discovered vulnerability?A . Updating the company vulnerability scanner and conducting a new scanB . Adding a buffer overflow rule to the intrusion detection systemC . Reconfiguring the firewallD . Installing a system updateView AnswerAnswer:...
How do activity logs help to implement and maintain a security plan?
How do activity logs help to implement and maintain a security plan?A . Activity logs provide advice on firewall installation, because they enable network baseline creation.B . Activity logs remind users to log on with strong passwords, because the logs can be analyzed to see if users are complying with...
Which of the following errors most commonly occurs when responding to a security breach?
Which of the following errors most commonly occurs when responding to a security breach?A . Shutting down network access using the firewall, rather than the network routerB . Adhering to the company policy rather than determining actions based on the IT manager's inputC . Making snap judgments based on emotions,...
Which of the following is the primary weakness of symmetric-key encryption?
Which of the following is the primary weakness of symmetric-key encryption?A . Data encrypted using symmetric-key encryption is subject to corruption during transport.B . Symmetric-key encryption operates slower than asymmetric-key encryption.C . Symmetric-key encryption does not provide the service of data confidentiality.D . Keys created using symmetric-key encryption are difficult...
Which of the following is a common problem with proxy servers?
Which of the following is a common problem with proxy servers?A . Proxy servers do not log incoming and outgoing access, so you will not be able to see details of successful and failed connections.B . Proxy servers cannot filter out specific application-layer traffic.C . Proxy servers may return old...
Which of the following activities will help you focus on creating policies for the most important resources?
You are creating an information security policy for your company. Which of the following activities will help you focus on creating policies for the most important resources?A . Auditing the firewallB . Implementing non-repudiationC . Logging usersD . Classifying systemsView AnswerAnswer: D
Which of the following security threats is the attacker exploiting, and what can be done to solve the problem?
A CGI application on the company's Web server has a bug written into it. This particular bug allows the application to write data into an area of memory that has not been properly allocated to the application. An attacker has created an application that takes advantage of this bug to...
Which symmetric algorithm created by the RSA Security Corporation is a stream cipher that encrypts messages as a whole, in real time?
Which symmetric algorithm created by the RSA Security Corporation is a stream cipher that encrypts messages as a whole, in real time?A . RC4B . RC6C . RC5D . RC2View AnswerAnswer: A
When fulfilling this request, which of the following resources should you audit the most aggressively?
Your organization has made a particularly unpopular policy decision. Your supervisor fears that a series of attacks may occur as a result. You have been assigned to increase automated auditing on a server. When fulfilling this request, which of the following resources should you audit the most aggressively?A . Authentication...
What is the first tool needed to create a secure networking environment?
What is the first tool needed to create a secure networking environment?A . User authenticationB . ConfidentialityC . Security policyD . AuditingView AnswerAnswer: C