|
What are the two primary risks to security for Infinite Horizons?
Customer data on stolen laptop computers
Denial of service attack on the Outlook Web Access server
Unauthorized access of the network via the dial-in server
Unauthorized access by employees to network data
Unauthorized access by employees to the customer relationship database
Unauthorized capturing and reading data being transmitted over the VPN connection to the company
| ||
|
What are the four security priorities of Infinite Horizons?
Preventing denial of service attacks on the Outlook Web Access server
Preventing unauthorized network access
Securing communications to client sites
Protecting employee data on laptop computers
Isolating the HR network from the rest of the network via an internal firewall
Providing SSL access to intranet resources
Secure authentication of all users
Enabling Windows Only authentication on SQL Server
| ||
|
What kind of technology would you use to secure data on the laptop computers?
NTFS permissions
Encrypting file system
Biometric scanner for reading employee fingerprints
A strong password policy
| ||
|
What technologies would you implement to guard against data corruption? (Choose all that apply.)
Virus scanner
Backups
Access control
Smart card reads
Data Encryption
| ||
|
What security policy statement would apply to Infinite Horizons?
Employees must use strong passwords to access the network as defined by the network administration group.
Employees must not lend their smart card to anyone.
Employees will not store company data on their laptops.
Hardware that requires user interaction must support a smart card reader.
| ||
|
What technology should Infinite Horizons employ to make sure data moving between it and its clients is secure?
TCP/IP
Firewall
Encryption
Dial-up
| ||
|
What technological limitation will Infinite Horizons face with regard to implementing security?
Password policy cannot be enforced.
Consultants may not be able to connect securely from client sites.
Laptop data will not be secure.
Data exchanged with clients will not be secure.
| ||
|
What compromises will Infinite Horizons have to make to integrate security with a customer’s network? (Choose all that apply.)
Different password policies
Data not confidentially exchanged
Separate passwords, no single login capability
No access control of the data
| ||
|
What is the most important goal when securing assets that Infinite Horizons needs to address in its security policy?
Integrity of the SQL Server 2000 database
Confidentiality of customer data
Physical security of the laptop computers
Availability of the Outlook Web Access server
| ||
|
What would be included in the security baseline for a laptop computer at Infinite Horizons?
Employees must use a smart card to log on to the laptop.
Back up the SQL Server database’s transaction logs every three hours and perform a full backup every night.
Passwords must have at least eight characters and be complex.
Confidential customer data must be encrypted on a laptop.
|
Answers