Certificate Mismatch Attack and Network Security Solutions
7 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What should the company do to assign different DLP rules based on the type of data hosted on the file server?

  • Use the same DLP rules for all types of data
  • Ignore the data types and use generic DLP rules
  • Rely on manual checks to assign DLP rules
  • Implement classification-based DLP rules (correct)

Which policy should the CISO use to prevent someone from using the exfiltrated credentials?

  • Single sign-on policy
  • Password complexity policy
  • Password rotation policy (correct)
  • Account lockout policy

What type of certificate should the company implement to simplify the certificate management process for its domain and subdomains?

  • EV SSL certificate
  • Code signing certificate
  • Self-signed certificate
  • Wildcard certificate (correct)

What type of attack is described when a user is presented with a certificate mismatch warning from the browser?

<p>Man-in-the-middle (MitM) attack (C)</p> Signup and view all the answers

What is the BEST solution to provide increased scalability and flexibility for back-end infrastructure without disrupting services?

<p>Load balancing (D)</p> Signup and view all the answers

Which social engineering technique seeks to exploit a person's sense of urgency?

<p>Scareware (B)</p> Signup and view all the answers

What should a security professional implement to satisfy both the CPO's and the development team's requirements regarding the use of PII in the development environment?

<p>Data masking approaches (A)</p> Signup and view all the answers

More Like This

Use Quizgecko on...
Browser
Browser