Question

A security analyst has been asked to implement secure protocols to prevent clear text credentials from...

A security analyst has been asked to implement secure protocols to prevent clear text credentials from being transmitted over the internal Network. Which of the following protocols is a security analyst most likely to implement? Select 2

  1. SNMPV3

  2. S/MIME

  3. DNSSEC

  4. SSH

  5. SFTP

Homework Answers

Answer #1

Solution:

Let us evaluate the various security protocols to prevent clear text credentials from being transmitted over the internal network:

1. SNMPV3 --> SNMP (Simple Network Management Protocol) uses community strings used for authentication are communicated in cleartext over the network and can potentially be captured while in transit and used to conduct subsequent attacks against other internal network infrastructure. Hence, this is not a solution for our requirement.

2. S/MIME --> This MIME protocol is mainly used for emails. It has no special provisions to encrypt transmission of cleartext passwords. Hence, this is not a solution for our requirement.

3. DNSSEC --> The Domain Name System Security Extensions is designed to protect Internet resolvers (clients) from forged DNS data, such as that created by DNS cache poisoning. It is a set of extensions to DNS and does not cater to cleartext password transmission. Hence, this is not a solution for our requirement.

4. SSH --> In Secure Shell or Secure Socket Shell, the connection is encrypted, so eavesdroppers can't see the password. Hence, this is a solution for our requirement.

5. SFTP --> In SSH File Transfer Protocol authentication is done on SSH layer and it's secure. Since the FTP is done on the SSH layer, hence the cleartext passwords will be encrypted and eavesdropper will not be able to see the password. Hence, this is a solution for our requirement.

Answer: The protocols likely to be implemented are SSH and SFTP.

Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
A security analyst has been to implement secure protocol is to prevent clear text credentials from...
A security analyst has been to implement secure protocol is to prevent clear text credentials from being transmitted or the internal Network. Which of the following protocols is a security analyst most likely to implement? Select 2 SNMPv3 s/mime Dnssec SSH SFTP
A security analyst has been to implement secure protocol to prevent clear text credentials from being...
A security analyst has been to implement secure protocol to prevent clear text credentials from being transmitted or the internal Network. Which of the following protocols is a security analyst most likely to implement? Select 2 SNMPv3 s/mime Dnssec SSH SFTP
You have recently been hired by a new Japanese accounting firm, headquarter in Tokyo, as the...
You have recently been hired by a new Japanese accounting firm, headquarter in Tokyo, as the director of Information Systems and Telecommunications. Your assignment is to assist security posture of the firm and develop a security structure for this new company. Write your recommendations and reasons to the firm’s CEO. The firm has 600 employees in Tokyo, 50 in Houston, and is planning to open two branch offices in India and California. Ten accountants will be hired at each site....
As the newly appointed financial analyst for Coverdale Office Machines Ltd., you have been asked to...
As the newly appointed financial analyst for Coverdale Office Machines Ltd., you have been asked to evaluate two alternative capital investment opportunities. The company’s corporate income tax rate is 24%. First, you must re-calculate the company’s cost of capital. The company recently paid its annual dividend of $2.75 per common share. According to your calculations, the company’s beta is 0.80. The company’s common shares currently trade for $25.80 each on the TSX. The market return is estimated at 16% and...
The project has been performing as planned, and the team members have been exhibiting increasing levels...
The project has been performing as planned, and the team members have been exhibiting increasing levels of trust between each other. The sponsor and the buyer have been satisfied with the delivery of business value, and user acceptance testing results are positive. A technical expert consulting with the team has expressed concerns that the team is not in agreement on the best way to deliver to the next review. If the project manager wants to support the team in reaching...
Project Integration Management Questions Only A team member notifies you, after the fact, that she has...
Project Integration Management Questions Only A team member notifies you, after the fact, that she has added extra functionality to the project. There was no impact on the cost or schedule. What should be done as a result of this change? Make sure marketing is aware of the change. Implement change control processes to track the change. Inform the customer. Understand what functionality was added. You are having difficulty getting a project underway. You have not been able to get...
Hi there, I've been asked to write a program in C which can read values from...
Hi there, I've been asked to write a program in C which can read values from a file then sort them, and then write to a binary file. I'm getting stuck when I write my binary file as the output is just spitting out garbage values and not the values that are being read in. When I print my input file reader everything is perfect but after sorting and then writing, the output is completely wrong. I have checked that...
Note:  100% plagiarism in the above paragraph please remove the plagiarism less than 15 % . CHALLENGES...
Note:  100% plagiarism in the above paragraph please remove the plagiarism less than 15 % . CHALLENGES / OPPORTUNITIES One of the major challenges is to change the people’s perspective of PepsiCo as an unhealthy soft drink producer. Due to the link of soft drinks to obesity and diabetes, the new CEO wants to reinvent Pepsi as a healthy food producer rather than a snacks producer. Although this is a good plan for the PepsiCo to consider, people who are used...
Asia’s e-commerce landscape has been booming in recent years. The swift adoption of smartphones and greater...
Asia’s e-commerce landscape has been booming in recent years. The swift adoption of smartphones and greater access to the internet has allowed consumers in the region to be a major force in the global digital economy. The expansion looks set to continue at a rapid pace. According to a November 2018 report by Fitch Solutions, e-commerce sales in the region are forecast to increase by 14.2% this year, with an estimated average annual increase of 14% over the medium term...
Funding an IS project through a Chargeback method involves: Pricing the IS service out for the...
Funding an IS project through a Chargeback method involves: Pricing the IS service out for the customer buying the end product Direct billing by the firm for IS resources or services to the department that uses them Direct billing by the manager of a function for IS resources or services to an employee that uses them An accounting process that reduces tax liability for capital investments All of the following are attributes of considering IS costs as Overhead except the...