Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Please answer the ALL the questions carefully. Thanks. -An origination\'s polici

ID: 3714019 • Letter: P

Question

Please answer the ALL the questions carefully. Thanks.

-An origination's policies require encryption of sensitive data in transit. The organization does not typically sensitive data but occasionally needs to provide it to clients via encrypted email channels. which of the following encryption solutions would be easiest to manage in this environment? A) One-time pads B) PGP C) Diffie- Hellman D) RSA 2- Which of the following authentication methods uses ticket granting season key? A) RADIUS B) TACACS C) SAML D) Kerberos 3- A Security administrator believes in the company's network is under attack. A packet capture of the current network traffic shows packet with the FIN, PSH, and URG flags set to one. Which of the following attacks is the company most likely experiencing? A) Xmas B) Null C) Smurf D) Replay 4- A recent audit it has revealed a Long term employee has access to shares in several different departments that are not the related to the employee's current position. Which of the following would reduce the likelihood of this issue occurring again? A) Periodic user account audits B) User assigned privileges C) Continuous alert monitoring D) Biometric user authentication 5- An analyst is documenting the user interaction process associated with the Login prompts in the application. In the application structures, the user enters a username and one- time password, which was previously emailed to the user. Next, the users enter a PIN and is then allowed into the dashboard of the applications to modify accounts details. In this scenario, which of the following steps immediately precedes the authorization process? A) Accessing the account B) Entering the username C) Receiving the one-time password D) Submitting the PIN

Explanation / Answer

1) An organization's policies require encryption of sensitive data in transit. The organization does not typically sensitive data but occasionally needs to provide it to clients via encrypted email channels, which of the following encryption solutions would be easiest to manage in this environment?

Answer)
B) PGP
Pretty Good Privacy is the encryption program which is used to decrypt and encrypt the email messages over the internet so that secure messages can be provided to and from clients.

2) Which of the following uses ticket granting season key?

D) Kerberos
Kerberos is an authentication method which uses ticket-granting ticket service and thus uses ticket granting season key.

3) FIN, PSH and URG flas set to one. Which attack is the company most likely experiencing?

A) Xmas - Xmas attack tries to get around firewall and sets TCP flags: FIN, PSH, and URG to one. Thus the company is most likely experiencing thus attack.


4) Which of the following would reduce the likelihood of this issue occuring again?

B) User assigned privileges - would reduce the likelihood of the issue where employee has access to shares in different departments that are not related to the employee's current position.

5) In this scenario, which of the following steps immediately precedes the authorization process?

C) Receiving the one-time password - is the step that immediately precedes the authorization process as the OTP was emailed to the user previously.