100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
SANS 401 Practice () Exam $10.49   Add to cart

Exam (elaborations)

SANS 401 Practice () Exam

 0 view  0 purchase
  • Course
  • SANS 401 Practice
  • Institution
  • SANS 401 Practice

SANS 401 Practice () Exam

Preview 4 out of 104  pages

  • November 22, 2024
  • 104
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • SANS 401 Practice
  • SANS 401 Practice
avatar-seller
jackbundi9071
SANS 401 Practice (2024-2025) Exam



Kevin wants to accomplish the following tasks:
1) Inventory all devices
2) Inventory all software
3) Secure Configurations on all devices
4) Constant Vulnerability Assessment and Remediation
How should Kevin prioritize this list of tasks??


Using the CIS Critical Security Controls - Using the US-
CERT Incident handling Guideline - Using the Verizon Data
Breach Report - Using the Penetration Testing Framework -
<<<<Answers>>>Using the CIS Critical Security Controls


( Explanation )
The CIS Critical Security Controls are prioritized technical
security controls that was designed to prevent currently
known high-priority attacks as well as future attacks.


Which objective can be met by using CFEngine or Puppet?

,Network Activity Baselining - Mandatory Access Control -
Configuration Management - Log Analysis -
<<<<Answers>>>Configuration Management


( Explanation )
Puppet and CFEngine are configuration management tools.
They make it easier to apply a consistent secure configuration
among Linux hosts.


What is a benefit of running virtual instances in a public cloud
environment?


Physical hardware flaws such as those involving processors
do not affect virtual instances - Cloud APIs have stronger
authentication than those written for traditional environments
- Incident Responders can more effectively and efficiently
handle containment and recovery - Network traffic between
virtual machines is more secure because it can not be captured
on a virtual switch - <<<<Answers>>>Incident Responders
can more effectively and efficiently handle containment and
recovery


( Explanation )
Virtualization technologies and the elasticity inherent in cloud
platforms allows for more efficient and effective containment
and recovery with less service interruption than with more
traditional technologies. Virtual machine traffic sniffing

,occurs when an adversary has gained access to a victim
network and starts sniffing and monitoring VM traffic. This is
especially effective if the attacker can gain access to the
vSwitch. Successful exploitation of physical flaws that reside
on a computer's processor can result in kernel level
permissions and root-level file access. Most Cloud APIs are
written with weak authentication due to the desire for
simplicity.


Windows IoT is a version of which Windows OS?


Windows 8 - Windows 10 - Windows Server 2019 - Windows
Hyper-V Server - <<<<Answers>>>Windows 10


( Explanation )
Starting with Windows 10, Microsoft changed the name of
Windows Embedded to Windows IoT to capitalize on the
Internet of Things trend. Windows IOT operating systems are
intended for dedicated-use appliances in industries such as
utilities, manufacturing, retail, and healthcare. Windows IOT
is also intended for all the small and inexpensive devices used
for the "Internet of Things" (IoT), such as robots, quadcopters,
sensors, toys, and 3D printers.
Windows IOT is intended for industry-specific hardware
appliances, such as ICS/SCADA equipment, retail point-of-
sale, MRI scanners, robotics, digital signs, drones, 3D
printers, and more. It supports the ARM platform, as well as
x86 and x64 CPUs. It runs on Raspberry Pi, MinnowBoard,

, and Arduino devices. It is a rebranding of Windows
Embedded version that was part of earlier OS's.


Which fact is associated with the RSA cryptosystem?


It is useful in resource-constrained environments - The
algorithm is primarily based on symmetric permutation -
Vulnerabilities have been found in some implementations - It
can be used for encryption, digital signatures, and hashing


INCORRECT ON PT - <<<<Answers>>>Vulnerabilities
have been found in some implementations


Although there have been a large number of claims to having
cracked the RSA algorithm, they have all turned out to be
false. Vulnerabilities have been found in certain RSA
implementations, however. Poor implementations of the RSA
algorithm can be compromised but it does not mean the
algorithm itself has been cracked.
RSA is an asymmetric cryptosystem, and so does not use a
symmetric algorithm. Elliptic Curve Cryptosystems are
efficient and therefore useful in resource-constrained
computing environments. RSA can be used for encryption and
digital signatures, but not hashing.

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller jackbundi9071. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $10.49. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

72042 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$10.49
  • (0)
  Add to cart