Question: 50 You have just deployed an application that uses hash-based checksums to monitor changes in the configuration scripts of a database server that is accessible

50 You have just deployed an application that uses hash-based checksums to monitor changes in the configuration scripts of a database server that is accessible via the Internet. Which of the following is a primary concern for this solution?

  1. The extra hard disk space required to store the database of checksums
  2. The amount of memory remaining now that the checksum-based application is running
  3. The possibility of a buffer overflow attack leading to a security breach
  4. The security of the checksum database on a read-only media format

____________________________________________________________________________________

51 Which of the following activities is the most effective at keeping the actions of nae end users from putting the companys physical and logicalWhich of the following activities is the most effective at keeping the actions of na?e end users from putting the companys physical and logical resources at risk?

  1. Configuring network intrusion-detection software to monitor end user activity
  2. Conducting a training session at the time of hire
  3. Reconfiguring the network firewall
  4. Assembling a team of security professionals to monitor the network

________________________________________________________________________________________-

52

Your organization has made a particularly unpopular policy decision. Your supervisor fears that a series of attacks may occur as a result. You have been assigned to increase automated auditing on a server. When fulfilling this request, which of the following resources should you audit the most aggressively?

  1. Authentication databases, including directory servers
  2. Intrusion detection systems, especially those placed on sensitive networks
  3. Log files on firewall systems
  4. Firewall settings for desktop systems

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!