Please help Network Security Fundamentals
You are reviewing logs and notice that a large amount of outbound traffic from 1:00am - 4:00am. Your company works a traditional 8:00am - 5:00pm and uses an in house backup solution. What could this be a sign of?
Cloud backup
Bad login information
Aliens
Data Exfiltration
Which of the following can help protect against an insider threat? Select all that apply
DLP
Seperation of duties
Aliens
Job/Position rotation
Social media can introduce considerable risk to an organization. Which of the following are examples of this? Select all that apply.
Use your company's security policy in class
Talking about lunch plans
Mentioning that you are going to a concert this weekend
Mentioning the new product that you are working on
What does sideloading provide?
Access the internet via a USB port
Determine your calendar remotely
Ability to add apps to a device without being logged in
Loading a secondary OS on a device
What is the difference between SMS and MMS?
MMS is multilingual only
SMS is only permitted in English
SMS is limited to sending text only
MMS is limited to messages only
What mechanism does Bluetooth use to establish a trust
relationship?
Kerberos
Pairing
PKI
Public Key
Which of the following are elements of a good Mobile Device Management (MDM) policy? Select all that apply.
The ability to decrypt data on the device
The ability to remotely wipe the device if it is lost or stolen
The ability to lock the device if it is lost or stolen
The ability to wipe the device automatically after several failed login attempts
What are push notification services?
Services which deliver information only when requested
Services which do not deliver content
Services which require a web interface
Services which deliver information without a request.
What is a weakness of the DNS
protocol?
Requests and replies are sent in plaintext.
It doesn’t provide billing standardization in cloud infrastructures.
Its encryption capabilities are slow.
TCP can be used for large transfers such as zone transfers.
What did Transport Layer Security (TLS)
replace?
SHA
SSH
SSL
RSA
What is the purpose of Lightweight Directory Access
Protocol Secure (LDAPS)?
It uses a SSL/TLS tunnel to connect LDAP services.
It digitally signs DNS records.
It leverages encryption protections of SSH to secure FTP transfers.
. It provides both symmetric and asymmetric encryption
Which of the following are considered secure
protocols?
SSH
DNS
SMTP
FTP
1.D =Cloud Backup
You are reviewing logs and notice that a large amount of outbound traffic from 1:00 am - 4:00 am. Your company works a traditional 8:00 am - 5:00 pm and uses an in house backup solution. It is the sign of Cloud Backup.
2.A = DLP
DLP is can help protect against an insider threat.
3.A and D
Social media can introduce considerable risk to an organization.
Those are
Use your company's security policy in class
Mentioning the new product that you are working on
4. A = Provides access
sideloading provide Access the internet via a USB port.
5.C =Limited to send text only
SMS is limited to sending text only
6.B =Pairing
Paring mechanism does Bluetooth use to establish a trust relationship.
7. D = Ability to Wipe data After Incorrect Login Attempts.
The ability to wipe the device automatically after several failed login attempts.
8.D = Services which deliver information without a request.
Push Notification Services are Services which deliver information without a request.
9.B = Doesn't provide billing standardizations.
the weakness of the DNS protocol It doesn’t provide billing standardization in cloud infrastructures.
10. = SSL
Transport Layer Security (TLS) replace is SSL
11. A = It uses an SSL/TLS tunnel to connect LDAP services.
purpose of Lightweight Directory Access Protocol Secure (LDAPS) uses an SSL/TLS tunnel to connect LDAP services.
12.A = SSH
The SSH is the Secure Protocol.
Answer:------------
Seperation of duties
Mentioning the new product that you are working on
Ability to add apps to a device without being logged in
SMS is limited to sending text only
Pairing
The ability to wipe the device automatically after several failed login attempts
Services which deliver information without a request.
TCP can be used for large transfers such as zone transfers.
SSL
It leverages encryption protections of SSH to secure FTP transfers.
SSH
Please help Network Security Fundamentals You are reviewing logs and notice that a large amount of...
Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...