Question

In: Computer Science

A Chief Security Officer (CSO) has been unsuccessful in attempts to access the website for a...

A Chief Security Officer (CSO) has been unsuccessful in attempts to access the website for a potential partner (www.example.net).

Which of the following rules is preventing the CSO from accessing the site? Blocked sites: *.nonews.com, *.rumorhasit.net, *.mars?

  1. Rule 1: deny from inside to outside source any destination any service smtp
  2. Rule 2: deny from inside to outside source any destination any service ping
  3. Rule 3: deny from inside to outside source any destination {blocked sites} service http-https
  4. Rule 4: deny from any to any source any destination any service any

______________________________________________________________________________________________________________________________

A security administrator is tasked with implementing centralized management of all network devices. Network administrators will be required to logon to network devices using their LDAP credentials. All command executed by network administrators on network devices must fall within a preset list of authorized commands and must be logged to a central facility.

Which of the following configuration commands should be implemented to enforce this requirement?

  1. LDAP server 10.55.199.3
  2. CN=company, CN=com, OU=netadmin, DC=192.32.10.233
  3. SYSLOG SERVER 172.16.23.50
  4. TACAS server 192.168.1.100

Solutions

Expert Solution

A Chief Security Officer (CSO) has been unsuccessful in attempts to access the website for a potential partner (www.example.net).Which of the following rules is preventing the CSO from accessing the site? Blocked sites: *.nonews.com, *.rumorhasit.net, *.mars?

Answer: Rule 3: deny from inside to outside source any destination {blocked sites} service http-https

Explanation:

I know you're confused between C and D. Technically both c and d are right, but the practicality of d being in place is very low.

'C' is a more direct reasonable answer as web traffic will primarily use http and https.

A security administrator is tasked with implementing centralized management of all network devices. Network administrators will be required to logon to network devices using their LDAP credentials. All command executed by network administrators on network devices must fall within a preset list of authorized commands and must be logged to a central facility.

Which of the following configuration commands should be implemented to enforce this requirement?

AnsweR: CN=company, CN=com, OU=netadmin, DC=192.32.10.233

Explanation:

There will be confusion as why D) cannot be the answer. It can be but only when you replace TACAS with TACACS+, then I believe D is the correct answer.

TACAS+ specs:

  • TACACS+ allows centralised management of network devices.
  • TACACS+ can be used to limit what commands can be entered on network devices. -
  • TACACS+ can be used to log all the commands entered on network devices.

Since they have asked for a command not the server, option B will be correct here as it is a command.

The above answers are 100% correct.

If you have any doubts, leave a comment below and I'll help you out


Related Solutions

You have been employed by Challenger Constructions as their first Chief Information Security Officer (CISO). You...
You have been employed by Challenger Constructions as their first Chief Information Security Officer (CISO). You have been tasked by the Board to conduct a review of the company’s risks and start to deploy security policies to protect their data and resources. You are concerned that the company has no existing contingency plans in case of a disaster. The Board indicated that some of their basic requirements for contingency planning include: A Recovery Time Objective (RTO) of 4 hours A...
You have been employed by Challenger Constructions as their first Chief Information Security Officer (CISO). You...
You have been employed by Challenger Constructions as their first Chief Information Security Officer (CISO). You have been tasked by the Board to conduct a review of the company’s risks and start to deploy security policies to protect their data and resources. You are concerned that the company has no existing contingency plans in case of a disaster. The Board indicated that some of their basic requirements for contingency planning include: A Recovery Time Objective (RTO) of 4 hours A...
A chief information security officer is creating a security committee involving multiple business units of a...
A chief information security officer is creating a security committee involving multiple business units of a corporation. Which of the following is the best justification to ensure collaboration across business units? A risk to business unit is a risk avoided by all business units, and liberal BYOD policies create new unexpected avenues for attackers to exploit Enterprises single point of coordination is required to ensure cyber-security issues are addressed in protected, compartmentalize groups without business unit collaboration, introduced by one...
The board of executives decides on creating a new position as chief security officer, however, they...
The board of executives decides on creating a new position as chief security officer, however, they are not sure if the new position should be part of it department and report to the chief It officer or the new CSO should be the same level to CIO and directly report to the board. What would be your recommendation as a security consultant and why?
A security consultant has observed that the attempts to breach the security of the companys computer...
A security consultant has observed that the attempts to breach the security of the companys computer system occurs according to a Poisson process with a mean rate of 3 attempts per day. (The system is on 24 hours per day.) (a) What is the probability that there will be four breach attempts tomorrow, and two of them will occur during the evening (eight-hour) shift? could u recalculate using 1 probability i think the probability is p(4 breaches tom | 2...
A security consultant has observed that the attempts to breach the security of the companys computer...
A security consultant has observed that the attempts to breach the security of the companys computer system occurs according to a Poisson process with a mean rate of 3 attempts per day. (The system is on 24 hours per day.) (a) What is the probability that there will be four breach attempts tomorrow, and two of them will occur during the evening (eight-hour) shift?
A corporation must appoint a president a chief executive officer chief operating officer and chief financial...
A corporation must appoint a president a chief executive officer chief operating officer and chief financial officer. It must also appoint a planning committee with five different numbers. There are 15 qualified candidates, and officers can also serve on the committee. What is the probability of randomly selecting the committee members and getting the five youngest of the qualified candidates?
Larry has been the chief financial officer (CFO) of Maxima Auto Service for the past 10...
Larry has been the chief financial officer (CFO) of Maxima Auto Service for the past 10 years. The company has reported profits each year it's been in business. However, this year has been a tough one. Increased competition and the rising costs of labor have reduced the company's profits. On December 30, Larry informs Robert, the company's president and Larry's closest friend for the past 10 years, that it looks like the company will report a net loss (total expenses...
Answer the questions by 3 paragraphs: Larry has been the chief financial officer (CFO) of Maxima...
Answer the questions by 3 paragraphs: Larry has been the chief financial officer (CFO) of Maxima Auto Service for the past 10 years. The company has reported profits each year it's been in business. However, this year has been a tough one. Increased competition and the rising costs of labor have reduced the company's profits. On December 30, Larry informs Robert, the company's president and Larry's closest friend for the past 10 years, that it looks like the company will...
Imagine this is your first day as Senior Chief Information Security Officer (CISO) of Company A....
Imagine this is your first day as Senior Chief Information Security Officer (CISO) of Company A. The Chief Financial Officer (CFO) calls you wondering what should have been done differently during a recent incident involving your predecessor. The following incidents recently occurred and were closed out without any alert to senior staff or the CFO. The Chief Financial Officer’s admin reported that their laptops were performing erratically and many popup screens kept appearing while browsing the Internet. Upon inspection, it...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT