Network Design - D482) A+ Score Solution.
Terms in this set (66)
A laptop has been stolen, and the Hard Drive Encryption
data has been seen for sale on the
darknet. Which process could have
protected the confidentiality of the
data?
Key Logger: Confidentiality
Classify each attack method in DNS Poisoning: Integrity
relation to its direct impact on the CIA
triad. Covert Channels: Confidentiality
DDoS: Availability
A security administrator has Confidentiality
configured a small keysize to protect
the VPN.
Which security objective does this
affect?
A laptop has been stolen, and the Hard Drive encryption
data has been seen for sale on the
darknet. Which process could have
protected the confidentiality of the
data?
When browsing to a financial To establish a trust relationship
website, a user receives an error on
the browser that points to the
certificate on the website. The user
reviews the certificate and maps it to
a known certificate authority.
Why did the user need to perform
these actions?
,A team of scientists is working on a 10.14.15.16
secure project. The network
administrator needs to configure a
network for the team that is not
routable from the Internet. A firewall
is protecting the scientists' network
and is using network address
translation (NAT) to translate the
internal IP addresses to public IP
addresses.
Which IP address should the network
administrator configure on the inside
interface of the firewall?
, An ad hoc network design team has Availability
just finished a presentation on the
latest updates to the organization's
network infrastructure. The team
ensured that plenty of redundancy
has been built in and bottlenecks
have been eliminated.
Which security objective has the team
bolstered through these
improvements?
A company has recently The employee's public key
implemented a new email
encryption system that uses public
key infrastructure
(PKI). The company is now requiring
all employees to sign and encrypt
internal communication. An
employee wants to send a digitally
signed message to the IT director.
What does the IT director use to
decode the employee's signature
under the new system?
An administrator at a small office is Setting up a port forward on the firewall from the outsourced company
tasked with supporting a new time to the time clock
clock that has been installed on the
network. The outsourced company
managing the time clock states that
the connection protocol it uses with
the clock is encrypted, but it needs to
allow incoming connections from the
Internet.
Which action should allow the
outsourced company to securely
manage the time clock with a
minimal amount of configuration
effort?
A small nonprofit company has Integrity of the key
received several legacy wireless
access points (APs) as a donation. The
security administrator discovers that
the encryption protocol the devices
use is not very secure. The encryption
key can be discovered by a malicious
hacker in only a few minutes. After
discussions with other security