A laptop has been stolen, Hard Drive Encryption
and the data has been
seen for sale on the
darknet. Which process
could have protected the
confidentiality of the
data?
Classify each attack Key Logger: Confidentiality
method in relation to its DNS Poisoning: Integrity
direct impact on the CIA Covert Channels: Confidentiality
triad. DDoS: Availability
A security administrator Confidentiality
has configured a small
keysize to protect the
VPN.
Which security objective
does this affect?
A laptop has been stolen, Hard Drive encryption
and the data has been
seen for sale on the
darknet.
Which process could have
protected the
confidentiality of the
data?
,When browsing to a To establish a trust relationship
financial website, a user
receives an error on the
browser that points to the
certificate
on the website. The user
reviews the certificate and
maps it to a known
certificate authority.
Why did the user need to
perform these actions?
A team of scientists is 10.14.15.16
working on a secure
project. The network
administrator needs to
configure a
network for the team that
is not routable from the
Internet. A firewall is
protecting the scientists'
network
and is using network
address translation (NAT)
to translate the internal IP
addresses to public IP
addresses.
Which IP address should
the network administrator
configure on the inside
interface of the firewall?
,An ad hoc network design Availability
team has just finished a
presentation on the latest
updates to the
organization's
network infrastructure. The
team ensured that plenty
of redundancy has been
built in and bottlenecks
have been eliminated.
Which security objective
has the team bolstered
through these
improvements?
A company has recently The employee's public key
implemented a new email
encryption system that
uses public key
infrastructure
(PKI). The company is now
requiring all employees to
sign and encrypt internal
communication. An
employee wants to send a
digitally signed message
to the IT director.
What does the IT director
use to decode the
employee's signature
under the new system?
, An administrator at a small Setting up a port forward on the firewall from the
office is tasked with outsourced company to the
supporting a new time time clock
clock that has been
installed on the
network. The outsourced
company managing the
time clock states that the
connection protocol it
uses
with the clock is
encrypted, but it needs to
allow incoming
connections from the
Internet.
Which action should allow
the outsourced company
to securely manage the
time clock with a minimal
amount of configuration
effort?
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Godzilla. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $0.00. You're not tied to anything after your purchase.