You work as an it security auditor hired by a law

This preview shows page 13 - 16 out of 25 pages.

27.You work as an IT security auditor hired by a law firm in Boston. You have been 13 / 25
Perfect 412-79v10 Dumps Questions V8.02 EC-Council ECSA V10 Certificationassigned the responsibility to audit the client for security risks.When assessing the risk to the clients network, what step should you take first? 28.Firewall is an IP packet filter that enforces the filtering and security policies to theflowing network traffic. Using firewalls in IPv6 is still the best way of protection fromlow level attacks at the network and transport layers.Which one of the following cannot handle routing protocols properly? 29.You are assisting a Department of Defense contract company to becomecompliant with the stringent security policies set by the DoD. One such strict rule isthat firewalls must only allow incoming connections that were first initiated by internalcomputers.What type of firewall must you implement to abide by this policy? 30.George is a senior security analyst working for a state agency in Florida. Hisstate's congress just passed a bill mandating every state agency to undergo asecurity audit annually. After learning what will be required, George needs toimplement an IDS as soon as possible before the first audit occurs.The state bill requires that an IDS with a "time-based induction machine" be used.What IDS feature must George implement to meet this requirement? A. Pattern matchingB. Statistical-based anomaly detectionC. Real-time anomaly detectionD. Signature-based anomaly detection Answer: C 14 / 25
Perfect 412-79v10 Dumps Questions V8.02 EC-Council ECSA V10 Certification 31.Frank is working on a vulnerability assessment for a company on the West coast.The company hired Frank to assess its network security through scanning, pen tests,and vulnerability assessments. After discovering numerous known vulnerabilitiesdetected by a temporary IDS he set up, he notices a number of items that show up asunknown but questionable in the logs.He looks up the behavior on the Internet, but cannot find anything related.What organization should Frank submit the log to find out if it is a new vulnerability ornot?

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture