Question: Question 11 Martuska is working with a client that regularly sends its workers into disaster areas in order to provide relief to persons in that
Question 11
Martuska is working with a client that regularly sends its workers into disaster areas in order to provide relief to persons in that area. Unfortunately, those workers sometimes encounter dangerous conditions, such as flash flooding, and occasionally have encountered armed looters. The client is concerned for the well-being of their employees and, of course, the data they carry. Martuska and the client will be focused on controls that address:
| A. | Privacy |
| B. | Confidentiality |
| C. | Safety |
| D. | Integrity |
Question 12
Agota is evaluating the needs of a client with 150 remote stores. Sales and inventory transactions are handled by a central database at the headquarters. When the internet connection to the headquarters is down, all of the stores are cutoff. The client desires to avoid this situation, Agota and her client will be focused on controls that address:
| A. | Confidentiality |
| B. | Non-Repudiation |
| C. | Availability |
| D. | Integrity |
Question 13
Piroska is evaluating the needs of a client that tracks the locations of nuclear waste disposal sites and the inventory of radioactive materials stored in each one. It is very important that this information be accurate. To address this need, Piroska and her client will be focused on controls that address:
| A. | Confidentiality |
| B. | Availability |
| C. | Privacy |
| D. | Integrity |
Question 14
The CFO doesn't care; just make it work. They must be able to RDP from their home computer back to their office's desktop computer or the fate of the company hangs in the balance and other overstated drama. You know the CFO's home is on the local cable internet provider. Your boss says, just make it work for now, and we'll tighten things down next week. You'll have to poke a hole in the corporate firewall. Which approach solves the CFO's problem and offers the most overall security?
| A. | deny all, allow 3389 but only with a source IP that belongs to the local cable internet provider |
| B. | deny all, allow 22 but only with a source IP that belongs to the local cable internet provider |
| C. | deny all, allow 22 |
| D. | deny all, allow 3389 |
Question 15
Betty has a computer in their laboratory that runs lots of batch jobs that interact with an attached plant incubator. That computer runs the "sshd" software, allowing her to login from home and check on the status of her experiments and the various batch jobs. That computer offers a number of other network services related to controlling the plant incubator, but she doesn't need to reach them remotely. You recommend the computer implement a host firewall. Which configuration will protect all of the services, but make ssh available for her to connect to from home?
| A. | allow all but block port 22 | |
| B. | deny all but allow port 22 | |
| C. | deny all but allow ports 22, 80, and 443 | |
| D. | deny all |
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
