Question

In: Computer Science

Company XYZ has decided to make use of a cloud-based service that requires mutual, certificate- based...

Company XYZ has decided to make use of a cloud-based service that requires mutual, certificate- based authentication with its users. The company uses SSL-inspecting IDS at its network boundary and is concerned about the confidentiality of the mutual authentication.

Which of the following model prevents the IDS from capturing credentials used to authenticate users to the new service or keys to decrypt that communication?

  1. Use of OATH between the user and the service and attestation from the company domain
  2. Use of active directory federation between the company and the cloud-based service
  3. Use of smartcards that store x.509 keys, signed by a global CA
  4. Use of a third-party, SAML-based authentication service for attestation
  5. __________________________________________________________________________________________________________

A technician receives a device with the following anomalies:

Frequent pop-up ads

Show response-time switching between active programs Unresponsive peripherals The technician reviews the following log file entries:

File Name Source MD5 Target MD5 Status

antivirus.exe F794F21CD33E4F57890DDEA5CF267ED2 F794F21CD33E4F57890DDEA5CF267ED2

Automatic iexplore.exe 7FAAF21CD33E4F57890DDEA5CF29CCEA AA87F21CD33E4F57890DDEAEE2197333 Automatic service.exe 77FF390CD33E4F57890DDEA5CF28881F 77FF390CD33E4F57890DDEA5CF28881F Manual USB.exe E289F21CD33E4F57890DDEA5CF28EDC0 E289F21CD33E4F57890DDEA5CF28EDC0 Stopped

Based on the above output, which of the following should be reviewed?

  1. The web application firewall
  2. The file integrity check
  3. The data execution prevention
  4. The removable media control

____________________________________________________________________________________________________________________________________---

A systems administrator wants to implement a wireless protocol that will allow the organization to authenticate mobile devices prior to providing the user with a captive portal login. Which of the following should the systems administrator configure?

  1. L2TP with MAC filtering
  2. EAP-TTLS
  3. WPA2-CCMP with PSK
  4. RADIUS federation

_____________________________________________________________________________________________________________________________________-

A bank is experiencing a DoS attack against an application designed to handle 500 IP-based sessions. in addition, the perimeter router can only handle 1Gbps of traffic.

Which of the following should be implemented to prevent a DoS attacks in the future?

  1. Deploy multiple web servers and implement a load balancer
  2. Increase the capacity of the perimeter router to 10 Gbps
  3. Install a firewall at the network to prevent all attacks
  4. Use redundancy across all network devices and services

________________________________________________________________________________________________________________________-

A user receives an email from ISP indicating malicious traffic coming from the user's home network is detected. The traffic appears to be Linux-based, and it is targeting a website that was recently featured on the news as being taken offline by an Internet attack. The only Linux device on the network is a home surveillance camera system.

Which of the following BEST describes what is happening?

  1. The camera system is infected with a bot.
  2. The camera system is infected with a RAT.
  3. The camera system is infected with a Trojan.
  4. The camera system is infected with a backdoor.

Solutions

Expert Solution

Ans 1. Use of active directory federation between the company and the cloud-based service.

because active directory federation is a service offered by the windows sever in which user can be able to authenticate itself outside the company network using cloud service which make the user crededential is bieng captured by IDS implemented in company

Ans 2. The file integrity check

because if device is attacked by some malicious code then it wlll definitely loose its integrity as malicous code altered the files

Ans 3. RADIUS federation

as it contains the 802.1X in which the devices are preauthenticate means first it authenticate the mobile device for connection to wireless then only it will redirect you to the login portal to connect with the wireless using your credentials.

Ans 4. Use redundancy across all network devices and services

because it will increase the network availbility and decrease the failure risk

Ans 5. The camera system is infected with a bot

This can only be done by the only bot because bot is an automated tool which is preconfigured and deployed in target system to done specific task and rest of the work done by bot automatically whereas RAT and trojan are not automated tool or malware in this you have to control it from your end and backdoor is nothing but just a loophole made by the attacker by which he can only enter or exit to network without detected by Firewal, IDS or IPS

Please hit the like button if you find this helpful for you THANK YOU AND HAPPY LEARNING:)


Related Solutions

What event convinced Netflix to switch to a cloud-based service? 2. Why is it important for...
What event convinced Netflix to switch to a cloud-based service? 2. Why is it important for Netflix that AWS has multiple availability regions? 3. Do you watch TV or movies on Netflix? Or any other online streaming application? Have you encountered varying quality of service at different times of day? Why do you think it happened? 4. Briefly explain 3 drawbacks of using Cloud Computing? Support your answer by giving examples.
Please read and answer questions Freshdesk is a cloud-based platform that offers Software as a Service...
Please read and answer questions Freshdesk is a cloud-based platform that offers Software as a Service (SaaS) solutions for common customer service functions, such as automated handling of customer support tickets, maintenance of community forums, live chat support and phone support, and an automatically updated knowledge base that converts common customer service responses into permanent articles. Businesses sign up for one of several payment plans depending on their budgets and needs, ranging from as low as $15 per month to...
2) Company A is based in UK and has a subsidiary in the US that requires...
2) Company A is based in UK and has a subsidiary in the US that requires funding in USD. It decides to enter into a currency swap agreement with company B in US. Company A will pay 5% on a Sterling principal of £10,000,000 and receive 6% on a US$ principal of $15,000,000 every year for the next 3 years. The current exchange rate is $1.5 USD per UK Sterling. Question: a) Explain and calculate the cash flow exchanges at...
2) Company A is based in UK and has a subsidiary in the US that requires...
2) Company A is based in UK and has a subsidiary in the US that requires funding in USD.    It decides to enter into a currency swap agreement with company B in US. Company A will pay 5% on a Sterling principal of £10,000,000 and receive 6% on a US$ principal of $15,000,000 every year for the next 3 years. The current exchange rate is $1.5 USD per UK Sterling. Question:   Explain and calculate the cash flow exchanges at the...
A group of graduate students has decided to form a small Internet Service Company in Brevard...
A group of graduate students has decided to form a small Internet Service Company in Brevard County. The company will service Brevard County Florida home users and need $400 million to start the company. Two financing plans have been proposed by the investment banking firms. Plan A is an all common- equity alternative. Under this agreement, 4 million common shares will be sold to net the firm $100 per share. Plan B involves the use of financial leverage (debt and...
A group of graduate students has decided to form a small Internet Service Company in Brevard...
A group of graduate students has decided to form a small Internet Service Company in Brevard County. The company will service Brevard County Florida home users and need $400 million to start the company. Two financing plans have been proposed by the investment banking firms. Plan A is an all common- equity alternative. Under this agreement, 4 million common shares will be sold to net the firm $100 per share. Plan B involves the use of financial leverage (debt and...
As manager of the St. Cloud Theatre​ Company, you have decided that concession sales will support...
As manager of the St. Cloud Theatre​ Company, you have decided that concession sales will support themselves. The following table provides the information you have been able to put together thus​ far: Item                Selling Price               Variable Cost             % of Revenue Soft Drink       $1.20                          $0.60                          26 Wine               $1.80                          $0.95                          26 Coffee             $1.00                          $0.35                          29 Candy             $1.00                          $0.35                        19 Last year�s manager, Jim Freeland, has advised you to be sure to add 10% of variable cost as a waste allowance for all...
After taking business classes, Hannah decided to start her own web-based business that would make use...
After taking business classes, Hannah decided to start her own web-based business that would make use of one of her hobbies.  She is selling custom-ordered, fabric headbands over the internet for $10 each.  Shipping and handling costs are paid by the customer.  The fabric and elastic used to make the headbands costs $1 per headband. Hannah’s mother, aunt, and sister, who are avid seamstresses, have agreed to sew the headbands for a price of $3 each. (They serve as contract manufacturers.) Hannah has...
1. High-Low Method for a Service Company Boston Railroad decided to use the high-low method and...
1. High-Low Method for a Service Company Boston Railroad decided to use the high-low method and operating data from the past six months to estimate the fixed and variable components of transportation costs. The activity base used by Boston Railroad is a measure of railroad operating activity, termed “gross-ton miles,” which is the total number of tons multiplied by the miles moved. Transportation Costs Gross-Ton Miles January $854,100 325,000 February 952,200 363,000 March 673,000 235,000 April 913,000 351,000 May 765,700...
1. High-Low Method for a Service Company Boston Railroad decided to use the high-low method and...
1. High-Low Method for a Service Company Boston Railroad decided to use the high-low method and operating data from the past six months to estimate the fixed and variable components of transportation costs. The activity base used by Boston Railroad is a measure of railroad operating activity, termed “gross-ton miles,” which is the total number of tons multiplied by the miles moved. Transportation Costs Gross-Ton Miles January $929,600 247,000 February 1,036,400 276,000 March 732,500 179,000 April 993,700 268,000 May 833,400...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT