John the security administrator at Certkiller Inc. is working on mitigating all threats to the network.
What threats are expected for the SAFE SMR small network campus module? (Choose two)
A.
The IP spoofing threat
B.
The Packet sniffers threat
C.
The Application layer attacks threat
D.
The Denial of service threat
Explanation:
Threats Mitigated
1. Packet sniffers-A switched infrastructure limits the effectiveness of sniffing
2. Virus and Trojan-horse applications-Host-based virus scanning prevents most viruses and many Trojan horses
3. Unauthorized access-This type of access is mitigated through the use of host-based intrusion detection and application access control
4. Application layer attacks-Operating systems, devices, and applications are kept up-to-date with the latest security fixes, and they are protected by HIDS
5. Trust exploitation-Private VLANs prevent hosts on the same subnet from communicating unless necessary
6. Port redirection-HIDS prevents port redirection agents from being installed Reference: Safe white papers:14
SAFE: Extending the Security Blueprint to Small, Midsize, and Remote-User Networks