Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Please answer the ALL the questions carefully. Thanks 11- After reviewing the fo

ID: 3714026 • Letter: P

Question

Please answer the ALL the questions carefully. Thanks

11- After reviewing the following route logs, a network technician is concerned the company router may have been compromised PERMIT USER ADMIN FROM 100.123.4.31 on VTY 15 PERMIT USER ADMIN FROM 72.16.4.90 on VTY 2 PERMIT USER ADMIN FROM 192.168.1.31 on VTY 1 PERMIT USER ADMIN FROM 192.168.1.90 on VTY 8 Which of the following should the technician implement to best ensure only authorized IT staff can remotely connect to that company's router? A) access-list admin_net 192.168.1.0/24 VTY 0-15 permit dmin net B) VTY 0-15 shutdown Console: enable, timeout 60 C) access-list banned_nets 100.123.4.0/24, 72.16.4.0/24 VTY 0-15: deny banned_nets D) Console : disable VTY 1-15: disable VTY O:enable 12- An employee has been using steganography to bypass DLP controls and exfiltration customer credit card number in an image file. Which of the following describes why the employee use this method? A) steganography is difficult to detect with automated tools. B) steganography is the quickest way to bypass encryption. C)steganography allows the employees to bypass access controls for sensitive data. D) steganography allows larger amount of data to be moved at one time 13- An administrator is reviewing the logs and sees a TLS 1.2 HELO, followed by a reset request, followed by SSL 3 HELO. Which of the following attacks may be taking place? A) MITM B) URL hijacking C) DoS D) Replay 14- while reviewing access logs, a security administrator is discovering the following output: exps21 mic darwin IP address 64.213.8.1 205.8.7.3 118.6.2.4 Token serial s10a7f9 s10a7f9 s10a7f9 Time 13:13 14:01 14:35 Which of the following should the security administrator recommended to increase the security posture for authentication? A) Single sign-on access B) Smart card C) Access control D) Multi-factor authentication

Explanation / Answer

11)
Ans: access-list banned_nets 100.123.4.0/24, 72.16.4.0/24 VTY 1-15:deny banned_nets
should be the technician implement to best ensure only authorized IT staff can reotely connect to that comapany's router.

12)
Ans: By using steganography is difficult to detect with automated tools method the employe has been using steganography to bypass DLP controls and exfiltration customer credit card number in an image file.

13)
Ans: Dos attacts taking place of an adminstrator is reviewing the logs and sees a TLS 1.2 HELO, followed by a reset request, followed by SSL3 HELO.

14)
Ans: Multi-factor authentication is the security recommended to increase the security posture for authentication