Performance based questions

¡Supera tus tareas y exámenes ahora con Quizwiz!

Company Manages Smart Phone Screen Lock Strong Password Device Encryption Remote Wipe GPS Tracking Pop-up blocker Data Center Terminal Server Cable Locks Antivirus Host Based Firewall Proximity Reader Sniffer Mantrap

QUESTION 1 DRAG DROPA security administrator wants to implement strong security on the company smart phones and terminal servers located in the data center. Drag and drop the applicable controls to each asset types.Instructions: Controls can be used multiple times and not all placeholders need to be filled. When you have completed the simulation, please select the Done button to submit.Select and Place:

Correct Answer: (For Question 1001) Firewall 1: DNS Rule - ANY ANY HTTPS/DNS PERMIT HTTPS Outbound - 10.0.0.1/24 ANY HTTPS PERMIT Management - ANY ANY SSH PERMIT HTTPS Inbound - ANY ANY HTTPS PERMIT HTTP Inbound - ANY ANY HTTP DENY Firewall 2: No changes should be made to this firewall Firewall 3: DNS Rule - ANY ANY HTTPS/DNS PERMIT HTTPS Outbound - 192.168.0.1/24 ANY HTTPS PERMIT Management - ANY ANY SSH PERMIT HTTPS Inbound - ANY ANY HTTPS PERMIT HTTP Inbound - ANY ANY HTTP DENY

QUESTION 1001 SIMULATION A company recently added a DR site and is redesigning the network. Users at the DR site are having issues browsing websites. INSTRUCTIONS Click on each firewall to do the following:1. Deny cleartext web traffic.2. Ensure secure management protocols are used. 3. Resolve issues at the DR site. The ruleset order cannot be modified due to outside constraints.If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

1. Spear Phishing 2. Hoax 3. Vishing 4. Phishing 5. Pharming

QUESTION 2 HOTSPOTSelect the appropriate attack from each drop down list to label the corresponding illustrated attack.Instructions: Attacks may only be used once, and will disappear from drop down list if selected. When you have completed the simulation, please select the Done button to submit.Hot Area:

FTP 21 Telnet 23 SMTP 25 SNMP 161 SCP 22 TFTP 69

QUESTION 221 DRAG DROPDrag and drop the correct protocol to its default port. Select and Place:

1. CPU cache 2. Ram 3. Swap 4. Hard drive

QUESTION 236 *** *** *** *** *** *** *** DRAG DROPA forensic analyst is asked to respond to an ongoing network attack on a server. Place the items in the list below in the correct order in which the forensic analyst should preserve them.Select and Place:

see picture

QUESTION 249 SIMULATION Task: Configure the firewall (fill out the table) to allow these four rules: Only allow the Accounting computer to have HTTPS access to the Administrative server. Only allow the HR computer to be able to communicate with the Server 2 System over SCP. Allow the IT computer to have access to both the Administrative Server 1 and Administrative Server 2

1. Retina scan = Something you are 2. Smard Card = somethg u have 3. Hardware token = somethg u have 4. password= somethg u know 5. pin nr. = somethg u know 6. fingerprint = somethg u are

QUESTION 250 HOTSPOTFor each of the given items, select the appropriate authentication category from the dropdown choices. Instructions: When you have completed the simulation, please select the Done button to submit.Hot Area:

Unsupervised Lab: -All are Cable Locks Office: -Proximity Badge -Safe Date Center: CCTV Proximity Badge Man trap locking cabinet Biometric Reader Employee Laptops: -Biometric Readers all of them

QUESTION 3 DRAG DROPYou have been tasked with designing a security plan for your company. Drag and drop the appropriate security controls on the floor plan.Instructions: All objects must be used and all place holders must be filled. Order does not matter. When you have completed the simulation, please select the Done button to submit.Select and Place:

/boot ..... die vorletzte antwort von ganz unten

QUESTION 564 DRAG DROPA security auditor is reviewing the following output from file integrity monitoring software installed on a very busy server at a large service provider. The server has not been updates since it was installed. Drag and drop the log entry that identifies the first instance of server compromise.Select and Place:

1. Standard naming convention 2. group policy 3. usage auditing and review 4. permission auditing and review

QUESTION 565 DRAG DROPA security administrator has been tasked with implementing controls that meet management goals. Drag and drop the appropriate control used to accomplish the account management goal. Options may be used once or not at all. Select and Place:

Rule 1: Source: 10.10.9.12/32 Accounting Destination: 192.168.10.5/32 Web Server Port: 443 (HTTPS) Protocol: Any Action: Permit Rule 2: Source: 10.10.9.14/32 Human Resources Destin.: 192.168.100.10/32 Financial Server Port: 22 (SCP) Protoc: TCP Act: Permit Rule 3: Source:10.10.9.18/32 Admin Destin.: 192.168.100.10/32 Financial Server Port: 69 (TFTP) Protoc: UDP Act: Permit Rule 4: Source: 10.10.9.18/32 Admin Destin: 192.168.100.18/32 Purchasing Server Port: 69 (TFTP) Protocol: UDP Act: Permit

QUESTION 884 HOTSPOTThe security administration has installed a new firewall which implements an implicit DENY policy by default. INSTRUCTIONS Click on the firewall and configure it to allow ONLY the following communication: - The Accounting workstation can ONLY access the web server on the public network over the default HTTPS port. The accounting workstation should not access other networks. - The HR workstation should be restricted to communicate with the Financial server ONLY, over the default SCP port. - The Admin workstation should ONLY be able to access the server on the secure network over the default TFTP port. The firewall will process the rules in a top-down manner in order as a first match. The port number must be typed in and only one port number can be entered per rule. Type ANY for all ports. (If at any time you would like to bring back the initial state of the simulation, please click the Reset All button. )

1. Botnet - Enable DDos protection 2. RAT - disable remote access service 3. Worm - change the default application password 4. Keylogger -Implement 2FA using push notification 5. Backdoor - conduct a code review

Question 909 HOTSPOTSelect the appropriate attack and remediation from each drop-down list to label the corresponding attack with its remediation. INSTRUCTIONS Not all attacks and remediation actions will be used. If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

1. ssh-keygen-t rsa 2. ssh-copy-id-i ~/ssh/id_user@server 3. chmod 644 ~/.ssh/id_rsa 4. ssh root@server

Question: 932 DRAG DROPA security engineer is setting up passwordless authentication for the first time.INSTRUCTIONS: Use the minimum set of commands to set this up and verify that it works. Commands cannot be reused. If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.


Conjuntos de estudio relacionados

Chapter 19 - Share-Based Compensation and Earnings Per Share

View Set

DOSAGE CALCULATION EXAM 01 PREP QUIZ 1

View Set

Project Management Foundations LinkedIn Lesson

View Set

Ch. 33 Specific (Adaptive) Immunity

View Set

digital marketing - email marketing

View Set