Question: Please solve All the Questions carefully OR do not answer anything someone else will... Thanks in advance 6- A security engineer is deploying a protective

Please solve All the Questions carefully OR do not answer anything someone else will... Thanks in advance

Please solve All the Questions carefully OR do not answer anything someone

6- A security engineer is deploying a protective tool on a critical, isolated network segment where patching and uploading are slowed by the requirements for thorough testing. Which of the following is the BEST tool for deployment on this network segment? B) Heuristic IDS C) Signature-based IPS D) Behavior-based IDS 7- A security specialist is helping a developer test an application's security. After deploying new changes to the application, the specialist suggests testing them build with fuzzing software. The security specialist is trying to: A) discover and exploit input errors in the application B) locate forms in the application that are vulnerable to cross-site scripting C) test the presence of server-side buffer overflows. D) stress test the server with a large number of SQL injection queries 8- A one-time secure connection is needed to provide transport security for an application that uses a non-standard TCP-based protocol. Which of the following requires the applications to configured accordingly? A) SSH tunneling B) IPSec VPN C) SSLTLS D) SFTP 9- A company utilizes the Diffie-Hellman key exchange algorithm during the process of connecting clients to an IPSec VPN concentrator, Lately, the client software has started to warn that the key exchange process uses only a 768- bit models. The client software warns that future versions will only connect to VPN concentrator using a 1024 -bitch or higher. Which of the following should the security administrative do to eliminate this warning? A) configure the clients to use DSA key exchange rather than Diffie-Hellman. B) Select a different key exchange group for the tunnel C) Have the concentrator perform the key exchange twice for a 1538-bit effective modulus. D) Select a higher bit encryption algorithm like AES on both the clients and concentrator 10- Corporate policy mandates that data should not be stored with personal information, such as family photos Which of the following BE ST implements this poli A) Full disk encryption B) Asset tracking C) Application control D) Strong segmentation

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!