Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Pease answer ALL questions carefully 43- Joe, a technician, recently updated and

ID: 3721780 • Letter: P

Question

Pease answer ALL questions carefully

43- Joe, a technician, recently updated and intrusion signatures for a new malware; however, this rule has generated an overwhelming number of IDS alerts. The investigations from those events have been deemed non- threatening. Those IDS alerts are considered to be. A) false positions. B) false negatives. C) explained anomalies. D) malicious logic. 44- A small business owner recently created an e-commercial website. The owner of already requires customers to connect to the web server using the HTTPS protocol. Which of the following should the owner adapt to BEST secure the customers' service data while is in transit? A) Generate a self-signed certification. B) Install a public CA certification. C) Remove the public certification from the website D) Publish the private key to users. 45- virtualization would provide an ROl when implemented under which of the following situation? A) Numerous servers with no fail-over requirement. B) Multiple existing 100% utilized physical servers. C) Numerous client with requirement for fast processors. D) multiple existing but underutilized physical servers. 46- A company is concerned with multiple attacks on the ERP system and wants to configure a secondary ERP to mirror the first. The secondary ERP will contain padded information to monitor against attack. Which of the following should the company deploy? A) Honeypot B) Bastion host C) IDS D) Sandbox 47- A Security team wishes to use a non-proprietary authentication system that operates with the connection- oriented protocols. Which of the following authentication and authorization protocols would support this requirement? A) RADIUS B) XTACACS C) TACACS+ D) DIAMETER

Explanation / Answer

Solution:

43)

B

This is an example of False Negative because a false negative is where a non-threatening object or person is considered as threatening.

44)

B

45)

D

46)

Honeypot

47)

B

XTACACS

I hope this helps if you find any problem. Please comment below. Don't forget to give a thumbs up if you liked it. :)

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote