In: Computer Science
Company XYZ has decided to make use of a cloud-based service that requires mutual, certificate- based authentication with its users. The company uses SSL-inspecting IDS at its network boundary and is concerned about the confidentiality of the mutual authentication.
Which of the following model prevents the IDS from capturing credentials used to authenticate users to the new service or keys to decrypt that communication?
A technician receives a device with the following anomalies:
Frequent pop-up ads
Show response-time switching between active programs Unresponsive peripherals The technician reviews the following log file entries:
File Name Source MD5 Target MD5 Status
antivirus.exe F794F21CD33E4F57890DDEA5CF267ED2 F794F21CD33E4F57890DDEA5CF267ED2
Automatic iexplore.exe 7FAAF21CD33E4F57890DDEA5CF29CCEA AA87F21CD33E4F57890DDEAEE2197333 Automatic service.exe 77FF390CD33E4F57890DDEA5CF28881F 77FF390CD33E4F57890DDEA5CF28881F Manual USB.exe E289F21CD33E4F57890DDEA5CF28EDC0 E289F21CD33E4F57890DDEA5CF28EDC0 Stopped
Based on the above output, which of the following should be reviewed?
____________________________________________________________________________________________________________________________________---
A systems administrator wants to implement a wireless protocol that will allow the organization to authenticate mobile devices prior to providing the user with a captive portal login. Which of the following should the systems administrator configure?
_____________________________________________________________________________________________________________________________________-
A bank is experiencing a DoS attack against an application designed to handle 500 IP-based sessions. in addition, the perimeter router can only handle 1Gbps of traffic.
Which of the following should be implemented to prevent a DoS attacks in the future?
________________________________________________________________________________________________________________________-
A user receives an email from ISP indicating malicious traffic coming from the user's home network is detected. The traffic appears to be Linux-based, and it is targeting a website that was recently featured on the news as being taken offline by an Internet attack. The only Linux device on the network is a home surveillance camera system.
Which of the following BEST describes what is happening?
Ans 1. Use of active directory federation between the company and the cloud-based service.
because active directory federation is a service offered by the windows sever in which user can be able to authenticate itself outside the company network using cloud service which make the user crededential is bieng captured by IDS implemented in company
Ans 2. The file integrity check
because if device is attacked by some malicious code then it wlll definitely loose its integrity as malicous code altered the files
Ans 3. RADIUS federation
as it contains the 802.1X in which the devices are preauthenticate means first it authenticate the mobile device for connection to wireless then only it will redirect you to the login portal to connect with the wireless using your credentials.
Ans 4. Use redundancy across all network devices and services
because it will increase the network availbility and decrease the failure risk
Ans 5. The camera system is infected with a bot
This can only be done by the only bot because bot is an automated tool which is preconfigured and deployed in target system to done specific task and rest of the work done by bot automatically whereas RAT and trojan are not automated tool or malware in this you have to control it from your end and backdoor is nothing but just a loophole made by the attacker by which he can only enter or exit to network without detected by Firewal, IDS or IPS
Please hit the like button if you find this helpful for you THANK YOU AND HAPPY LEARNING:)