|
Matrix Systems wants to open a new office in St. Paul, Minnesota, to serve as the service center for all offices and resellers. There are two other sites, one in Los Angeles and another in Boston. The St. Paul site will be accessible to the other sites using direct link; in addition, the resellers must be able to access the partner extranet to retrieve inventory data. What type of perimeter security configuration should you use to design the new site?
Back-to-back configuration
Three-pronged configuration
Proxy server configuration
Bastion host
| ||||||||||||||||||
|
When an incident occurs, you must initiate a response procedure. The incident response procedure should include the following steps. Place the steps in the order that they will be carried out by the incident response team.
| ||||||||||||||||||
|
In order to better prepare for a security incident, what actions should you take to predict the threats that your organization could face?
Use a threat model to gauge the type of threats and their impact on your organization.
Create a security response team.
Create a risk and response diagram.
Create a threat diagram.
| ||||||||||||||||||
|
A web server has not properly been patched with a hotfix that alleviates a buffer overrun. In addition, when the server is unable to connect to its database, it displays an error message with the connection information (username and password) that it was using to connect to the database. What parts of the STRIDE threat model describe the threats a situation such as this presents? (Choose all that apply.)
Spoofing identity
Tampering of data
Repudiation
Information disclosure
Denial of service
Elevation of privilege
| ||||||||||||||||||
|
Sojourn Incorporated has several traveling employees who use laptop computers to access the network. In the past, laptops have been infected with a virus while outside of the LAN and later infected the Sojourn corporate environment. What recommendations would you make to prevent this from occurring in the future? (Choose the best answer.)
Require laptop computers to be scanned for viruses by the IT staff prior to accessing the LAN.
Install antivirus software with Live Update enabled on all laptops before they are allowed to leave the premises.
Don’t allow laptop computers to access the LAN.
Install Internet Connection Firewall on all Windows XP laptops.
| ||||||||||||||||||
|
Your company has workstations in the lobby that allows guests to access the Internet while awaiting meetings and other appointments. You are worried that someone may be able to access sensitive corporate information by installing a program to record the network packets traveling on the network. What can you do to alleviate this potential threat?
Remove the computer from the lobby and place it in the conference room.
Require users to log in on the workstation.
Remove the floppy and CD/DVD drive from the workstations.
Place this computer outside the corporate firewall so that it is on a different segment than that of the corporate workstations and servers.
| ||||||||||||||||||
|
You are the administrator of a large retail chain with offices in more than 40 states. You need to make sure that all computers are kept up-to-date. Which of the following should you do to eliminate network vulnerabilities? (Choose all that apply.)
Apply service packs
Apply feature packs.
Apply hotfixes.
Uninstall services that are not being used.
All of the above.
| ||||||||||||||||||
|
Your organization is concerned that users may be running Trojan horse applications that may be exposing your infrastructure to security exploits. You must develop a procedure that will be used to determine what services should be running on a computer. Which of the following steps should you complete? (Choose all that apply.)
Create a list of the services that should be running on workstations.
Use the Windows Service Challenge and Response (WSCR) utility to design a security authentication scheme that will validate services prior to accessing resources.
Compare the services running on the machine with those on the list and remove the services that are not on the accepted list.
Remove the user’s permissions to run services on the workstations.
| ||||||||||||||||||
|
You are designing a new segment to your network that will include an extranet. The extranet will be accessible to partners and must be secured so that its resources cannot be consumed from the Internet. The corporate LAN’s resources should also be inaccessible from both the Internet and the extranet. You want to make sure that all precautions are taken to prevent a breach into your LAN, even if the extranet is breached. Which network segmentation technique should you use?
Bastion host
Three-pronged configuration
Back-to-back configuration
DMZ-Aware Tunnel
| ||||||||||||||||||
|
After an incident occurs and is resolved, which of the following steps should your security response team complete?
Evidence preservation
Incident Declaration
Communication channel exploration
Evaluation
|
Answers