You are the security administrator for your company. You are required to implement a solution that will provide the highest level of confidentiality possible to all data on the network. Two-factor token and biometric-based authentication is implemented for all users. Administrator-level accounts are tightly controlled and issued separately to each user needing administrative access. Auditing is
enabled to log all transactions. All hard drives are protected using full disk encryption. All resources have access control lists (ACLs) that can only be changed by an administrator. All server resources are virtualized. LUN masking is implemented to segregate storage area network (SAN) data. All switches are configured with port security. The network is protected with a firewall using ACLs, a NIPS device, and secured wireless access points. You need to improve the current architecture to provide the stated goal. What should you do?
A. Implement transport encryption.
B. Implement MAC filtering on all network devices.
C. Implement data-at-rest encryption.
D. Implement PKI authorization.
A
Explanation: You should implement transport encryption to provide the highest level of confidentiality possible for all data on the network.
MAC filtering prevents or allows users to connect to a network based on the MAC address of the device they are using. Data-at-rest encryption is already implemented on the hard drives. PKI authorization would just authorize users to access resources. PKI does not provide encryption for data as it is transmitted over then network.
You might also like to view...
What is output by the following Java code segment? int temp = 180;
``` while (temp != 80) { if (temp > 90) { System.out.print("This porridge is too hot! "); // cool down temp = temp – (temp > 150 ? 100 : 20); } else { if (temp < 70) { System.out.print("This porridge is too cold! "); // warm up temp = temp + (temp < 50 ? 30 : 20); } } } if (temp == 80) { System.out.println("This porridge is just right!"); } ``` a. This porridge is too cold! This porridge is just right! b. This porridge is too hot! This porridge is just right! c. This porridge is just right! d. None of the above.
Which of the following statements about critical sections is false?
a) Only one thread at a time can execute the instructions in its critical section for a particular resource. b) If one thread is already in its critical section, another thread must wait for the executing thread to exit its critical section before continuing. c) Once a thread has exited its critical section, a waiting thread may enter its critical section. d) All threads must wait whenever any critical section is occupied.
If you have statistics on the expected frequency of condition evaluations, you should use them to make your program faster and more efficient.
Answer the following statement true (T) or false (F)
You should use the ____ method to close a sequential access file as soon as you are finished using it.
A. Exit B. Close C. End D. Quit