What is the best choice to provide confidentiality of any type of information stored in a database including PII?
What technical control will ensure that messages sent between upper-level executives are not altered? Also, what would this ensure about the messages?
Hashing - This maintains the integrity
What will support a use case of supporting non-repudiation?
What provides a high degree of flexibility when testing security controls?
What provides a known starting point but is not flexible because it stays the same?
What makes systems more secure than their default configuration?
What will support a use case of supporting authentication?
What prevents unauthorized disclosure of data but not modifications of data?
What ensures that systems are up and operational when needed and uses fault tolerance and redundancy methods?
What command can you use to track packet flow through a network and if an extra router has been added to your network?
What command can you use to check connectivity with a remote system, but does not show route?
Which command will show network settings on a windows computer but does not show failed routers?
Which command will show network settings on a Linux computer but does not show failed routers?
Which command shows active connections and other network statistics on a local system but does not identify network paths?
Which authentication service uses x.500-based phrases to identify components and when encrypted it uses TLS?
LDAP - Lightweight Directory Access Protocol
What is a good choice to create a secure connection between two systems over the internet?
TLS (pg 51)
Which firewall filters traffic using an access control list?
Which firewall filters traffic based on a state of a packet within a session?
What is NIPS?
Network intrusion prevention system
What is NIDS?
Network Intrusion Detection System
What is HIPS?
Host-Based Intrusion Prevention System.
What type of serer provides port-based authentication and can authenticate clients?
An 802.1x Server
What can inspect clients for health, including having up-to-date virus definition files and can restrict network access to unhealthy clients to a remediation network?
NAC (Network Access Control)