Question 26

A software development team is conducting functional and user acceptance testing of internally developed web applications using a COTS solution. For automated testing, the solution uses valid user credentials from the enterprise directory to authenticate to each application. The solution stores the username in plain text and the corresponding password as an encoded string in a script within a file, located on a globally accessible network share. The account credentials used belong to the development team lead.
To reduce the risks associated with this scenario while minimizing disruption to ongoing testing, which of the following are the BEST actions to take? (Choose two.)
  • Question 27


    Compliance with company policy requires a quarterly review offirewall rules. You are asked to conduct a review on the internal firewall sitting between several internal networks. The intent of this firewall is to make traffic more secure. Given the following information perform the tasks listed below:
    Untrusted zone: 0.0.0.0/0
    User zone: USR 10.1.1.0/24
    User zone: USR2 10.1.2.0/24
    DB zone: 10.1.0/24
    Web application zone: 10.1.5.0/24
    Management zone: 10.1.10.0/24
    Web server: 10.1.5.50
    MS-SQL server: 10.1.4.70
    MGMT platform: 10.1.10.250
    Task 1) A rule was added to prevent the management platform from accessing the internet. This rule is not working. Identify the rule and correct this issue.
    Task 2) The firewall must be configured so that the SQL server can only receive requests from the web server.
    Task 3) The web server must be able to receive unencrypted requests from hosts inside and outside the corporate network.
    Task 4) Ensure the final rule is an explicit deny.
    Task 5) Currently the user zone can access internet websites over an unencrypted protocol. Modify a ruleso that user access to websites is over secure protocols only.
    Instructions: To perform the necessary tasks, please modify the DST port, SRC zone, Protocol, Action, and/or Rule Order columns. Type ANY to include all ports. Firewall ACLs are read from thetop down. Once you have met the simulation requirements, click Save. When you have completed the simulation, please select the Done button to submit. Once the simulation is submitted, please select the Next button to continue.

    Question 28

    A senior network security engineer has been tasked to decrease the attack surface of the corporate network. Which of the following actions would protect the external network interfaces from external attackers performing network scanning?
  • Question 29

    The Chief Executive Officers (CEOs) from two different companies are discussing the highly sensitive prospect of merging their respective companies together. Both have invited their Chief Information Officers (CIOs) to discern how they can securely and digitaly communicate, and the following criteria are collectively determined:
    * Must be encrypted on the email servers and clients
    * Must be OK to transmit over unsecure Internet connections
    Which of the following communication methods would be BEST to recommend?
  • Question 30

    Click on the exhibit buttons to view the four messages.





    A security architect is working with a project team to deliver an important service that stores and processes customer banking details. The project, internally known as ProjectX, is due to launch its first set of features publicly within a week, but the team has not been able to implement encryption-at-rest of the customer records.
    The security architect is drafting an escalation email to senior leadership.
    Which of the following BEST conveys the business impact for senior leadership?