Please answer the ALL the questions carefully. Thanks 36- Members of production
ID: 3714041 • Letter: P
Question
Please answer the ALL the questions carefully. Thanks
36- Members of production team have been used the username and password of Ann, an employee, to log into their workstation because Ana has elevated privileges. The administrations wants to prevent unauthorized users from logging in with false credentials, while still allowing Ann to continue to utilize her provided equipment. Which of the following should the administrator configure to achieve this? A) Concurrent login B) Password complexity C) Account lockout D) Authorized workstation 37- A security administrator has implemented an IPSes VPN. Which of the following at IPTABLES statements MUST be added to the firewall to allow the IPSec traffic through? (Select to two answers) A) iptables-A INPUT-p TCP--dport 50-j ACCEPT B) iptables -A INPUT -p UDP dport 51 -j ACCEPT C) iptables -A INPUT -p ESP -j ACCEPT D) iptables -A INPUT -p IP dport AH -j ACCEPT E) iptables -A INPUT -p TCP--dport 51 -j ACCEPT F) iptables-A INPUT-p AH-j ACCEPT 38- A company has recently been subject to a ransomware attack. The security technician needs to verify the downloads that were done most recently as part of investigative analysis. Which of the following is cryptography methods could be used to verify the downloads? A) RSA B) MD5 C) AES D) 3DES 39- Chief information officer (CIO) has requested an assessment of the new intranet site be conducted before beginning the deployment stage. Which of the following assessment techniques would BEST meet this requirement? A) Code review B) Review designs C) Vulnerability assessment D) System testing 40- An administrator wants to only allow DNS zone transfers between two different DMZ interfaces on the corporate firewall. Which of the following protocols BEST means the requirements by default? A) 53 TCP B) 54 UDP C) 110 TCP and UDP D) 143 UDPExplanation / Answer
36. D)Authoriaed Workstation
Using Authorized Workstations is the solution here because if the workstations are authorized to particular user, no other user id can be used to log in. Thus employee won't be able to use credentials of someone else to log in to a workstation authorized to them and at the same tinme Ann can also continue to use her authorized workstation with her login credentials.
37. A)iptables -A INPUT -p TCP --dport 50 -j ACCEPT
B)iptables -A INPUT -p UDP --dport 51 -j ACCEPT
By using the above to commands we allow or accept TCP connections at port 50 and the UDP connections at port 51. All other connections at other ports will not be accepted.
38. B.MD5
The MD5 algorithm is a widely used hash function. It can be used as a checksum to verify the data integrity of the downloaded files to prevent ransomware attacks
39. Vulnerability assessment
Vulnerability assessment would be best to identify the vulnerabilities in the intranet site before deployment and take possible steps to reduce their effect or mitigate them.