36 lines
1.5 KiB
Markdown
36 lines
1.5 KiB
Markdown
---
|
||
title: ECE09488 Assignment 6
|
||
author: Aidan Sharpe
|
||
date: May 2nd 2025
|
||
---
|
||
|
||
### 1. Which type of scan provides the most in-depth view of system misconfigurations?
|
||
b. Credentialed scan
|
||
|
||
### 2. Your credentialed scan revealed a known vulnerability in a recently updated application that is widely used across the company. Where can you get information on your company’s policies for how to reconfigure the application to close the vulnerability?
|
||
d. Risk register
|
||
|
||
### 3. How should you decide which security configurations to apply in a cloud deployment?
|
||
d. Use all available security tools for each layer
|
||
|
||
### 4. What security technique can you use to control traffic to a web server separately from traffic control for the website database?
|
||
b. Micro-segmentation
|
||
|
||
### 5. Which of the following security rules would allow an incoming Echo Reply on a stateful firewall?
|
||
a. Outbound rule: ICMP Allow to 0.0.0.0/0
|
||
|
||
### 6. Which security appliance can be used to secure an LMS (learning management system) application with some components deployed in a public cloud platform and some components deployed on-prem?
|
||
a. ADC
|
||
|
||
### 7. Which protocol provides the best encryption for data in transit over a Wi-Fi network?
|
||
b. AES
|
||
|
||
### 8. Which security tool can you use to find security vulnerabilities in forgoten EC2 instances?
|
||
c. EDR
|
||
|
||
### 9.
|
||
c. ADC
|
||
|
||
### 10. Suppose you are running an application secured by client-side encryption and you receive an error stating CLUSTER_NOT_FOUND. Which of the following problems is most likely the source of the issue?
|
||
a. Deleted key store
|