Question

Please help Network Security Fundamentals You are reviewing logs and notice that a large amount of...

Please help Network Security Fundamentals

You are reviewing logs and notice that a large amount of outbound traffic from 1:00am - 4:00am. Your company works a traditional 8:00am - 5:00pm and uses an in house backup solution. What could this be a sign of?

Cloud backup

Bad login information

Aliens

Data Exfiltration

Which of the following can help protect against an insider threat? Select all that apply

DLP

Seperation of duties

Aliens

Job/Position rotation

Social media can introduce considerable risk to an organization. Which of the following are examples of this? Select all that apply.

Use your company's security policy in class

Talking about lunch plans

Mentioning that you are going to a concert this weekend

Mentioning the new product that you are working on

What does sideloading provide?

Access the internet via a USB port

Determine your calendar remotely

Ability to add apps to a device without being logged in

Loading a secondary OS on a device

What is the difference between SMS and MMS?

MMS is multilingual only

SMS is only permitted in English

SMS is limited to sending text only

MMS is limited to messages only

What mechanism does Bluetooth use to establish a trust relationship?

Kerberos

Pairing

PKI

Public Key

Which of the following are elements of a good Mobile Device Management (MDM) policy? Select all that apply.

The ability to decrypt data on the device

The ability to remotely wipe the device if it is lost or stolen

The ability to lock the device if it is lost or stolen

The ability to wipe the device automatically after several failed login attempts

What are push notification services?

Services which deliver information only when requested

Services which do not deliver content

Services which require a web interface

Services which deliver information without a request.

What is a weakness of the DNS protocol?

Requests and replies are sent in plaintext.

It doesn’t provide billing standardization in cloud infrastructures.

Its encryption capabilities are slow.

TCP can be used for large transfers such as zone transfers.

What did Transport Layer Security (TLS) replace?

SHA

SSH

SSL

RSA

What is the purpose of Lightweight Directory Access Protocol Secure (LDAPS)?

It uses a SSL/TLS tunnel to connect LDAP services.

It digitally signs DNS records.

It leverages encryption protections of SSH to secure FTP transfers.

. It provides both symmetric and asymmetric encryption

Which of the following are considered secure protocols?

SSH

DNS

SMTP

FTP

0 0
Add a comment Improve this question Transcribed image text
Answer #1

1.D =Cloud Backup

You are reviewing logs and notice that a large amount of outbound traffic from 1:00 am - 4:00 am. Your company works a traditional 8:00 am - 5:00 pm and uses an in house backup solution. It is the sign of Cloud Backup.

2.A = DLP

DLP is can help protect against an insider threat.

3.A and D

Social media can introduce considerable risk to an organization.

Those are

Use your company's security policy in class

Mentioning the new product that you are working on

4. A = Provides access

sideloading provide Access the internet via a USB port.

5.C =Limited to send text only

SMS is limited to sending text only

6.B =Pairing

Paring mechanism does Bluetooth use to establish a trust relationship.

7. D = Ability to Wipe data After Incorrect Login Attempts.

The ability to wipe the device automatically after several failed login attempts.

8.D = Services which deliver information without a request.

Push Notification Services are Services which deliver information without a request.

9.B = Doesn't provide billing standardizations.

the weakness of the DNS protocol  It doesn’t provide billing standardization in cloud infrastructures.

10. = SSL

Transport Layer Security (TLS) replace is SSL

11. A = It uses an SSL/TLS tunnel to connect LDAP services.

purpose of Lightweight Directory Access Protocol Secure (LDAPS) uses an SSL/TLS tunnel to connect LDAP services.

12.A = SSH

The SSH is the Secure Protocol.

Add a comment
Answer #2

Answer:------------

  • Cloud backup
  • Seperation of duties

  • Mentioning the new product that you are working on

  • Ability to add apps to a device without being logged in

  • SMS is limited to sending text only

  • Pairing

  • The ability to wipe the device automatically after several failed login attempts

  • Services which deliver information without a request.

  • TCP can be used for large transfers such as zone transfers.

  • SSL

  • It leverages encryption protections of SSH to secure FTP transfers.

  • SSH

Add a comment
Know the answer?
Add Answer to:
Please help Network Security Fundamentals You are reviewing logs and notice that a large amount of...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around...

    Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT