Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Please answer ALL the questions carefully. Thanks 5- An administrator finds many

ID: 3719257 • Letter: P

Question

Please answer ALL the questions carefully. Thanks

5- An administrator finds many employees are clicking on links in phishing emails. Which of the following should the administrator implement to protect workers who are tricked by these emails? A) URL filter B) Spam filter C) protocol analyzer D) Web application firewall 6- when authenticating to a database, users are requires to use ten-character password and change their passwords every 60 days? Which of the following should also be added to this password policy to mitigate the possibility of password compromise? Lselect two) A) Password recovery B) Lockout period C) Increased complexity D) Limited reuse E) Account disablement 7- A developer needs to store sensitive employee information on a back-end database. The sensitive database records must be accessed by a public web server in the DMZ. Which of the following should be implemented to secure the sensitive information stored in the datahase ? A) Store the sensitive records using symmetric encryption B) Implement an ACL that prevent the web server from accessing the sensitive records C) Hash the sensitive records before storing them in the database D) Store the sensitive records using irreversible encryption 8- Joe, a security administrator, has started using a centralized application whitelist in his organization. Joe wishes only to allow applications within a specific folder to execute. Additionally, Joe would like to allow all application from a specific vendor. Which of the following controls should Joe implement? (select two answers) A) Create "deny" rules for all applications with a specific file hash B) Create "deny" rules for all applications with a specified file path C) Create "allow" for all applications singed with a specific digital signature D) Create "allow" rules for all applications with a specific file extension E) Create "allow" rules for all applications with a specific file path F Create "deny" for all applications singed with a specific digital signature

Explanation / Answer

5. B) Spam Filter
Filters spam emails
6. C) Increased complexity B) Lockout period
7. A) Store the sensitive records using symmetric encryption.
C) Hash the sensitive records before storing in the database.
8.
B) and C)

**Comment for any further queries.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote