Len has identified encrypted files in the network databases that contain sensitive information but are configured with access permissions that allow almost everyone access. What type of security issue is this?
Blog
Laurel is selecting a VPN protocol for her company’s network…
Laurel is selecting a VPN protocol for her company’s network. This network includes a large number of users that move between wireless hotspots in the course of their jobs. User privacy is also required when using the VPN. Which protocol should Laurel consider using?
Dez has been reading about encryption recently. She begins t…
Dez has been reading about encryption recently. She begins to wonder how anything can be secure if everyone is using the same set of algorithms. After all, anyone using the same algorithm would be able to decrypt anything that had been encrypted using that algorithm. Which of the following helps make the data unusable by anyone else using that same encryption scheme without having this information?
Denis is trying to determine which route’s packets are trave…
Denis is trying to determine which route’s packets are traveling over when accessing his company’s chosen cloud service provider. Which of the following Windows tools can help him discover that information?
Marcus has been asked to configure a web server with a speci…
Marcus has been asked to configure a web server with a specific private class C IP address. Which of the following is a possible address she was given?
Marcella has been hired to perform an audit of a security in…
Marcella has been hired to perform an audit of a security incident where a large corporation was using an open-source application that they had deployed to a cloud service provider. The application was used to manage the many people whose information it tracked and included a lot of identifying information about them that could be used in identity fraud. Unfortunately, the person that installed the application never removed the default administrative account that was still using the default password. Which of the following describes this scenario?
Lara is trying to decide on a protocol to use for a VPN to c…
Lara is trying to decide on a protocol to use for a VPN to connect from one cloud service provider to another. She knows there are a variety of protocols out there that can be used for VPNs but wants to make sure she chooses one that both cloud service providers support and that can be combined with IPsec. Which of the following protocols would she most likely need to choose?
Lyle’s manager has asked him to implement micro-segmentation…
Lyle’s manager has asked him to implement micro-segmentation for his company’s cloud deployment. He wasn’t very familiar with this term and upon researching, came across the reasoning to implement this as being that nothing should be trusted in a cloud environment and every system, communication, and user is considered a threat until proven otherwise. To which of the following concepts does this relate?
Joy has received several complaints that none of the users c…
Joy has received several complaints that none of the users can access the company’s resources that are hosted on a cloud service provider. The company has a piece of hardware installed that provides a VPN tunnel to the CSP. Upon entering the data center, she sees that all the lights are off on the device. She unplugs it and plugs it back in and does not see any changes. Which of the following has most likely occurred?
Adrienne wants to be able to analyze the traffic coming into…
Adrienne wants to be able to analyze the traffic coming into a Linux server’s network interface. Which of the following command line utilities will allow her to see this information?