Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Please solve both Questions carefully.. Thanks 31- An information security offic

ID: 3906730 • Letter: P

Question

Please solve both Questions carefully.. Thanks

31- An information security officer has been asked to investigate the feasibility of implementing full disk encryption within the organization to secure mobile devices. Which of the following features should the officer evaluate to determine if the organizational laptops are equipped to support hardware-based full disk encryption? A) UEFI B) TPM C) EFS D) SSD 32- A virtualized server in a datacenter is required to have high availability. A vendor-released security patch much be applied to the server as soon as possible. Which of the following would allow the server administrator to install the patch with the LEAST amount of downtime? A) The server administrator should take the VM offline and install the security patch. When the patch has been tested, and approved, the VM should be put back into service B) The server administrator should install the patch in a sandboxed area of the existing VM, and the VM should be taken offline. After testing the patch, the VM should be put back into service C) The server administrator should take a snapshot of the VM and apply the security patch to the snapshot. The original VM should be taken offline until testing and approval of the patch can be done D) The server administrator should take a snapshot of the VM, power it off, and spin up the snapshot. The patch should then be applied to the original VM. When the patch is installed and tested, the original VM should be put into service.

Explanation / Answer

Q31) The Information Security Officer should investigate about the following:-

c)EFS - The Encrypting File System (EFS) on Microsoft Windows is a feature introduced in version 3.0 of NTFS that provides filesystem-level encryption. The technology enables files to be transparently encrypted to protect confidential data from attackers with physical access to the computer.

Q32) C) Server Admin takes a snapshot of the VM and apply the security patch to the snapshot. The original VM should be taken until testing and approval of patch can be done.

Please let me know in case of any clarifications required. Thanks!