The technician should verify that the virtual servers are dual homed so that traffic is securely separated.
The technician should verify that the virtual servers and the host have the latest service packs and patches applied.
The technician should subnet the network so each virtual server is on a different network segment.
The technician should perform penetration testing on all the virtual servers to monitor performance.
Deploy smart cards
Time of day restrictions
Access control lists
Download the patch from the vendors secure website and install it on the most vulnerable workstation
Download the patch from the vendors secure website, test the patch and install it on all workstations.
Download the patch from the vendors secure website and install it as needed
Download the patch from the Internet, test the patch and install it on all of the productionservers.WBerlin
Driving from point to point with a laptop and an antenna to find unsecured wireless access points.
Driving from point to point with a wireless scanner to read other users emails through the access point.
Driving from point to point with a wireless network card and hacking into unsecured wireless access points.
Driving from point to point with a wireless scanner to use unsecured access points
Blocks everything and only allows privileges based on job description
Blocks everything and only allows explicitly granted permissions
Blocks everything and only allows the minimal required privileges
Blocks everything and allows the maximum level of permissions
At least once a week as part of system maintenance
As the definitions become available from the vendor
When a new virus is discovered on the system
When an attack occurs on the network
To look for weak passwords on the network
To changea users passwords when they leave the company
To enforce password complexity requirements
To change users passwords if they have forgotten them
Configure a rule in eachusers router and restart the router.
Configure rules on the users host and restart the host.
Install an anti-spam filter on the domain mail servers and filter the email address.
Install an ACL on the firewall to block traffic from the sender and filter the IP address.
A NIDS monitors and analyzes network traffic for possible intrusions
A NIDS is installed on the proxy server
A NIDS prevents certain types of traffic from entering a network.
A NIDS is normally installed on the email server.
Install HIDS to determine the CPU usage
Run performance monitor to evaluate the CPU usage
Install malware scanning software
Use a protocol analyzer to find the cause of the traffic
Encrypts a connection
Ensures data can be easily decrypted
Fixed length output
Requires a key
Ticket Granting System
Internet Key Exchange
Key Distribution Center
Buffer overflow protection
Internet content filter
Provides additional resources for testing
Provides real-time access to all system processes
Provides a read-only area for executing code
Provides a restricted environment for executing code
Network address translation