Question 86

A company's existing forward proxies support software-based TLS decryption, but are currently at 60% load just dealing with AV scanning and content analysis for HTTP traffic. More than 70% outbound web traffic is currently encrypted. The switching and routing network infrastructure precludes adding capacity, preventing the installation of a dedicated TLS decryption system. The network firewall infrastructure is currently at 30% load and has software decryption modules that can be activated by purchasing additional license keys. An existing project is rolling out agent updates to end-user desktops as part of an endpoint security refresh.
Which of the following is the BEST way to address these issues and mitigate risks to the organization?
  • Question 87

    A large hospital has implemented BYOD to allow doctors and specialists the ability to access patient medical records on their tablets. The doctors and specialists access patient records over the hospital's guest WiFi network which is isolated from the internal network with appropriate security controls. The patient records management system can be accessed from the guest network and require two factor authentication. Using a remote desktop type interface, the doctors and specialists can interact with the hospital's system. Cut and paste and printing functions are disabled to prevent the copying of data to BYOD devices. Which of the following are of MOST concern? (Select TWO).
  • Question 88

    Customers are receiving emails containinga link to malicious software. These emails are subverting spam filters. The email reads as follows:
    Delivered-To: [email protected]
    Received: by 10.14.120.205
    Mon, 1 Nov 2010 11:15:24 -0700 (PDT)
    Received: by 10.231.31.193
    Mon, 01 Nov 2010 11:15:23 -0700 (PDT)
    Return-Path: <[email protected]>
    Received: from 127.0.0.1 for <[email protected]>; Mon, 1 Nov 2010 13:15:14 -0500 (envelope-from<[email protected]>)
    Received: by smtpex.example.com (SMTP READY)
    with ESMTP (AIO); Mon, 01 Nov 2010 13:15:14 -0500
    Received: from 172.18.45.122 by 192.168.2.55; Mon, 1 Nov 2010 13:15:14 -0500 From: Company <[email protected]> To: "[email protected]" <[email protected]> Date: Mon, 1 Nov 2010 13:15:11 -0500 Subject: New Insurance Application Thread-Topic: New Insurance Application Please download and install software from the site below to maintain full access to your account.
    www.examplesite.com
    ________________________________
    Additional information: The authorized mail servers IPs are 192.168.2.10 and 192.168.2.11.
    The network's subnet is 192.168.2.0/25.
    Which of the following are the MOST appropriate courses of action a security administrator could take to eliminate this risk? (Select TWO).
  • Question 89

    A security architect is designing a system to satisfy user demand for reduced transaction time, increased security and message integrity, and improved cryptographic security. The resultant system will be used in an environment with a broad user base where many asynchronous transactions occur every minute and must be publicly verifiable.
    Which of the following solutions BEST meets all of the architect's objectives?
  • Question 90

    An infrastructure team is at the end of a procurement process and has selected a vendor. As part of the final negotiation, there are a number of outstanding issues, including:
    1. Indemnity clauses have identified the maximum liability.
    2. The data will be hosted and managed outside of the company's geographical location.
    The number of users accessing the system will be small, and no sensitive data will be hosted in the solution. As the security consultant of the project, which of the following should the project's security consultant recommend as the NEXT step?