Rowan-Classes/8th-Semester-Spring-2025/cloud-hardware/chapter-6-questions/chapter-6-questions.md
2025-05-05 11:41:28 -04:00

1.5 KiB
Raw Blame History

title author date
ECE09488 Assignment 6 Aidan Sharpe May 2nd 2025

1. Which type of scan provides the most in-depth view of system misconfigurations?

b. Credentialed scan

2. Your credentialed scan revealed a known vulnerability in a recently updated application that is widely used across the company. Where can you get information on your companys policies for how to reconfigure the application to close the vulnerability?

d. Risk register

3. How should you decide which security configurations to apply in a cloud deployment?

d. Use all available security tools for each layer

4. What security technique can you use to control traffic to a web server separately from traffic control for the website database?

b. Micro-segmentation

5. Which of the following security rules would allow an incoming Echo Reply on a stateful firewall?

a. Outbound rule: ICMP Allow to 0.0.0.0/0

6. Which security appliance can be used to secure an LMS (learning management system) application with some components deployed in a public cloud platform and some components deployed on-prem?

a. ADC

7. Which protocol provides the best encryption for data in transit over a Wi-Fi network?

b. AES

8. Which security tool can you use to find security vulnerabilities in forgoten EC2 instances?

c. EDR

9.

c. ADC

10. Suppose you are running an application secured by client-side encryption and you receive an error stating CLUSTER_NOT_FOUND. Which of the following problems is most likely the source of the issue?

a. Deleted key store