100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4,6 TrustPilot
logo-home
Examen

SEC401 Network Security Essentials 401.1 Questions and Answers 100% Pass

Puntuación
-
Vendido
-
Páginas
24
Grado
A+
Subido en
06-06-2024
Escrito en
2023/2024

SEC401 Network Security Essentials 401.1 Questions and Answers 100% Pass 3 Valid options for Data Protection - Correct Answer ️️ -1. Content Discovery - tools that help discover sensitive information in storage 2. Volume Storage Encryption - Protect volumes from being snapshotted, cloned and exposure, protects volumes from being explored by cloud provider, and prevents volumes from being exposed by physical loss of drives. 3. Object Storage Encryption - Same as volume storage encryption plus allows user to to implement VPS (Virtual Private Storage). Volume Storage - Correct Answer ️️ -This includes volumes attached to IaaS instances, typically as a virtual hard drive. Volumes often use data dispersion to support resilience and security. Object Storage - Correct Answer ️️ -Objects (files) are stored with additional metadata (content type, redundancy required, creation date, etc.). These objects are accessible through APIs and potentially through a web user interface. (example: Dropbox). Types of Object Storage encryption - Correct Answer ️️ -File/Folder Encryption, Client/Application Encryption, Proxy Encryption. Data Loss Prevention (DLP) - Correct Answer ️️ -A product that, based on central policies, identify, monitor, and protect data at rest, in motion, and in use through deep content analysis. Some ways DLP is handled: 1. Data can be blocked 2. it can be allowed to proceed after the data has been appropriately encrypted Data Migration to the Cloud (detection) - How do you manage unapproved data being moved to cloud services? - Correct Answer ️️ -2 steps to help manage unapproved data moving to cloud services: 1. Monitor Large internal data migrations with Database Activity Monitoring and File Activity Monitoring. 2. Monitor data moving to the cloud with URL filters and Data Loss Prevention tools. URL filtering allows you to monitor and prevent users connecting to cloud services. Database Activity Monitoring - Correct Answer ️️ -Captures and record all SQL activity in real time or near real time, including database administrator activity, across multiple database platforms; and can generate alerts on policy violations. File Activity Monitoring - Correct Answer ️️ -Monitor and record all activity within designated file repositories at the user level, generate alerts on policy violations. Data Dispersion - Correct Answer ️️ -A technique that is commonly used to improve data security but without the use of encryption mechanisms. Capable of providing high availability and assurance for data stored in the cloud by means of data fragmentation. Data Fragmentation - Correct Answer ️️ -a file is split into a specific number of fragments; all of these are sign and then distributed to a number of remote servers. The user then can reconstruct the file by accessing a certain number of arbitrarily chosen fragments. Barriers to developing full confidence in Security as a Service - Correct Answer ️️ - Compliance Multi-tenancy Vendor Lock-in What measures do security as a service providers take to earn the trust of their customers? - Correct Answer ️️ -1. Strong security controls and system lockdown functions 2. Rigid physical security 3. Background checks on personnel Business Continuity Recommendations for Customers hiring Cloud Service Providers - Correct Answer ️️ -1. Review contract of third-party commitments to maintain continuity o the provisioned service. 2. Review the third-party BC process 3. Conduct on site assessment 4. Ensure that they receive confirmation of any BCP/DR tests undertaken by the CSP. Disaster Recovery Recommendations for Customers hiring Cloud Service Providers - Correct Answer ️️ -1. Do not depend on a single provider of services and have a DR plan in place that facilitates migration or failover should supplier fail. 2. IaaS providers should have a contractual agreements with multiple platform providers that have tools in place to rapidly restore systems in the event of loss. Attacks against cloud infrastructure - Correct Answer ️️ -1. VM Traffic Sniffing - Undetectable by traditional monitoring solutions 2. Insecure Cryptography - Where are the Keys? 3. API Attacks - Application Program interface flaws 4. Shared Infrastructure - Lack of "air-gapped" systems 5. Hardware Flaws - spectre and meltdown 6. DoS - attacking the client, attacking the provider 7. Supply Chain Attacks - smaller budget, greater risk 8. Insider threat - Oldie but goodie Account Hijacking - Practice good security hygiene VM Traffic Sniffing - Correct Answer ️️ -Adversary gain

Mostrar más Leer menos
Institución
SANS SEC401
Grado
SANS SEC401










Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
SANS SEC401
Grado
SANS SEC401

Información del documento

Subido en
6 de junio de 2024
Número de páginas
24
Escrito en
2023/2024
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

$12.99
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
BrittieDonald Howard Community College
Ver perfil
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
423
Miembro desde
2 año
Número de seguidores
162
Documentos
22055
Última venta
2 semanas hace
BrittieDonald Study Solutions.

Get Help in Your Due Online and Actual Exams, Assignments with Well Researched and Up-to date Study Materials for Guaranteed Success

3.5

95 reseñas

5
43
4
14
3
7
2
5
1
26

Documentos populares

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes