In: Other
Which of the following attacks can be mitigated by proper data retention policies?
A. Dumpster diving
B. Man-in-the-browser
C. Spear phishing
D. Watering hole
A security administrator needs to conduct a full inventory of all encryption protocols and cipher suites. Which of the following tools will the security administrator use to conduct this inventory MOST efficiently?
A. Tcpdump
B. Protocol analyzer
C. Netstat
D. Nmap
A security analyst is interested in setting up an IDS to monitor the company network. The analyst has been told there can be no network downtime to implement the solution, but the IDS must capture all of the network traffic. Which of the following should be used for the IDS implementation?
A. Network tap
B. Honeypot
C. Aggregation
D. Port mirror
Which of the following is a security consideration for IoT devices?
A. IoT devices have built-in accounts that users rarely access.
B. IoT devices have less processing capabilities.
C. IoT devices are physically segmented from each other.
D. IoT devices have purpose-built applications.
Answer)
1. A. Dumpster diving
Dumpster driving which is the attack for looking into garbage and dumpster for data can be solved by this.
2. D. Nmap
Nmap can be used to filter out the specified values reuqired.
3. D. Port mirror
Port mirror can be used for traffic analysis by sending copy of the traffic.
4. D. IoT devices have purpose-built applications.