During a security assessment of a wireless network, Jim discovers that LEAP is in use on a network using WPA. What recommendation should Jim make? - ️️Use an alternate protocol like PEAP or EAP-TLS and implement WPA2 if supported.
Gordon is concerned about the possibility that hackers may be a...
ITM 450|48 Practice Questions And
Answers|2024
During a security assessment of a wireless network, Jim discovers that LEAP is in use on a network using
WPA. What recommendation should Jim make? - ✔ ✔ Use an alternate protocol like PEAP or EAP-
TLS and implement WPA2 if supported.
Gordon is concerned about the possibility that hackers may be able to use the Van Eck radiation
phenomenon to remotely read the contents of computer monitors in his facility. What technology
would protect against this type of attack? - ✔ ✔ TEMPEST
Harry would like to access a document owned by Sally and stored on a file server. Applying the
subject/object model to this scenario, who or what is the subject of the resource request? - ✔ ✔
Harry
Harry's request to write to the data file is blocked. Harry has a Secret security clearance, and the data
file has a Confidential classification. What principle of the Bell-LaPadula model blocked this request? - ✔
✔ *-Security Property
Helen is a software engineer and is developing code that she would like to restrict to running within an
isolated sandbox for security purposes. What software development technique is Helen using? - ✔ ✔
Confinement
If Susan's organization requires her to log in with her username, a PIN, a password, and a retina scan,
how many distinct authentication factor types has she used? - ✔ ✔ 2
In her role as an information security professional, Susan has been asked to identify areas where her
organization's wireless network may be accessible even though it isn't intended to be. What should
Susan do to determine where her organization's wireless network is accessible? - ✔ ✔ A site survey
IP addresses like 10.10.10.10 and 172.19.24.21 are both examples of what type of IP address? - ✔ ✔
Private IP address
Jim wants to allow cloud-based applications to act on his behalf to access information from other sites.
Which of the following tools can allow that? - ✔ ✔ OAuth
Johnson Widgets strictly limits access to total sales volume information, classifying it as a competitive
secret. However, shipping clerks have unrestricted access to order records to facilitate transaction
completion. A shipping clerk recently pulled all of the individual sales records for a quarter and totaled
them up to determine the total sales volume. What type of attack occurred? - ✔ ✔ Aggregation
Voordelen van het kopen van samenvattingen bij Stuvia op een rij:
Verzekerd van kwaliteit door reviews
Stuvia-klanten hebben meer dan 700.000 samenvattingen beoordeeld. Zo weet je zeker dat je de beste documenten koopt!
Snel en makkelijk kopen
Je betaalt supersnel en eenmalig met iDeal, creditcard of Stuvia-tegoed voor de samenvatting. Zonder lidmaatschap.
Focus op de essentie
Samenvattingen worden geschreven voor en door anderen. Daarom zijn de samenvattingen altijd betrouwbaar en actueel. Zo kom je snel tot de kern!
Veelgestelde vragen
Wat krijg ik als ik dit document koop?
Je krijgt een PDF, die direct beschikbaar is na je aankoop. Het gekochte document is altijd, overal en oneindig toegankelijk via je profiel.
Tevredenheidsgarantie: hoe werkt dat?
Onze tevredenheidsgarantie zorgt ervoor dat je altijd een studiedocument vindt dat goed bij je past. Je vult een formulier in en onze klantenservice regelt de rest.
Van wie koop ik deze samenvatting?
Stuvia is een marktplaats, je koop dit document dus niet van ons, maar van verkoper jackline98. Stuvia faciliteert de betaling aan de verkoper.
Zit ik meteen vast aan een abonnement?
Nee, je koopt alleen deze samenvatting voor €7,56. Je zit daarna nergens aan vast.