Question 151
A security administrator is hardening a TrustedSolaris server that processes sensitive data. The data owner has established the following security requirements:
The data is for internal consumption only and shall not be distributed to outside individuals The systems administrator should not have access to the data processed by the server The integrity of the kernel image is maintained Which of the following host-based security controls BEST enforce the data owner's requirements? (Choose three.)
Question 152
Which of the following activities is commonly deemed "OUT OF SCOPE" when undertaking a penetration test?
Question 153
A security incident responder discovers an attacker has gained access to a network and has overwritten key system files with backdoor software. The server was reimaged and patched offline. Which of the following tools should be implemented to detect similar attacks?
Question 154
Which of the following is MOST likely to be included in a security services SLA with a third-party vendor?
Question 155
The security administrator has just installed an active\passive cluster of two firewalls for enterprise perimeter defense of the corporate network.
Stateful firewall inspection is being used in the firewall implementation.
There have been numerous reports of dropped connections with external clients.
Which of the following is MOST likely the cause of this problem?