Richard suspects that a denial of service attack is taking place on his network that utilizes a large amount of SSL communications. He wishes to monitor network activity using a packet sniffer to determine whether this traffic is present on his network. What destination port should he look for in the packet sniffer output to confirm the presence of this traffic?

Richard suspects that a denial of service attack is taking place on his network that utilizes a large amount of SSL communications. He wishes to monitor...

Jan needs to build the business case for the implementation of a new firewall. She's confident that she can show that the new firewall will require less attention from the security staff and will result in significant manpower savings. She does not expect that there will be any change in the security posture of the organization based on this implementation, What type of approach is best suited to building the business case for this firewall?

Jan needs to build the business case for the implementation of a new firewall. She's confident that she can show that the new firewall will require...

What is a control?

What is a control? a. Any potential barrier that protects your information from unauthorized access b. Any data source that contains sensitive data c....

What is an SSO system?

What is an SSO system? a. Single sign-on b. Single secure opening c. Secure signal operation d. Single secure operation Answer: a. Single s...

What is the access control subject?

What is the access control subject? a. The passive entity that is the target of an access request b. The active entity that initiates an access request c....

Richard is responsible for evaluating whether his company should develop and host a Web site on the corporate network. He decides that the risk posed to the site by hackers overwhelms the benefit that would be gained from having the site and decides not to develop the site. What risk management technique is Richard practicing?

Richard is responsible for evaluating whether his company should develop and host a Web site on the corporate network. He decides that the risk posed...

A janitor cleaning the floor of an organization's data center accidentally tripped over a power cord and cut the power to a critical file server. Users who depend on that data to complete their job functions are unable to access it and must take time off from work until IT personnel arrive and restore power to the computer. What security principle is most involved in this incident?

A janitor cleaning the floor of an organization's data center accidentally tripped over a power cord and cut the power to a critical file server. Users...

Your organization hosts a web site within a DMZ and the web site accesses a database server in the internal network. ACLs on firewalls prevent any connections to the database server except from the web server. Database fields holding customer data are encrypted and all data in transit between the web site server and the database server are encrypted. Which of the following represents the GREATEST risk to the data on the server?

Your organization hosts a web site within a DMZ and the web site accesses a database server in the internal network. ACLs on firewalls prevent any connections...