Which of the following will best help you ensure a database server can withstand a recently discovered vulnera
Which of the following will best help you ensure a database server can withstand a recently discovered vulnerability?
Which of the following is the most effective way to respond to this attack?
You have determined that the company Web server has several vulnerabilities, including a buffer overflow that has resulted in an attack. The Web server uses PHP and has direct connections to an Oracle database server. It also uses many CGI scripts. Which of the following is the most effective way to respond to this attack?
Which of the following has most likely occurred?
You have discovered that the ls, su and ps commands no longer function as expected. They do not return information in a manner similar to any other Linux system. Also, the implementation of Tripwire you have installed on this server is returning new hash values. Which of the following has most likely occurred?
Which of the following organizations provides regular updates concerning security breaches and issues?
Which of the following organizations provides regular updates concerning security breaches and issues?
Which form of encryption should you use?
You have been asked to encrypt a large file using a secure encryption algorithm so you can send it via e-mail to your supervisor. Encryption speed is important. The key will not be transmitted across a network. Which form of encryption should you use?
Which of the following would you recommend?
Requests for Web-based resources have become unacceptably slow. You have been assigned to implement a solution that helps solve this problem. Which of the following would you recommend?
Which term best describes this device?
You have been assigned to configure a DMZ that uses multiple firewall components. Specifically, you must configure a router that will authoritatively monitor and, if necessary, block traffic. This device will be the last one that inspects traffic before it passes to the internal network. Which term best describes this device?
Which of the following techniques will best help reduce the severity of this attack?
A distributed denial-of-service (DDOS) attack has occurred where both ICMP and TCP packets have crashed the company’s Web server. Which of the following techniques will best help reduce the severity of this attack?
Which of the following is most likely to pose a security threat to a Web server?
Which of the following is most likely to pose a security threat to a Web server?
What is the first tool needed to create a secure networking environment?
What is the first tool needed to create a secure networking environment?