Quiz questions

User Generated

cenounxne

Computer Science

Description

I need the answers for the quiz questions

Unformatted Attachment Preview

20 points Save Answer Question 1 Please match the following standards with their description. North American Electric Reliability Corporation's (NERC's) Critical Infrastructure Protection (CIP) Reliability Standards A. Maps to many national security standards in Australia, Netherlands, Peru, etc. B. Utilizes Risk-Based Performance Standards to communicate required controls Chemical Facility Anti-Terrorism Standards (CFATS) C. Unique to this regulation is the use of a five-zone network separation model. NIST SP 800-82 NRC Regulation 5.71 D. Includes recommendations for Security, Management, Operational, and Technical controls in order to improve control system security E. Consists of nine separate configuration management controls ISO/IEC 27002:2005 5 points Save Answer Question 2 This organization is trying to normalize all the available controls from numerous regulations to a common "compliance taxonomy." National Institute of Standards and Technology Unified Compliance Framework Department of Homeland Security ONSA 20 points Save Answer Question 3 Please match the following Electronic Security Perimiter recommendations to the standards compliance body. NERC CIP-005-4 R1 A. Construct security perimeters at the edge of all enclaves, using CFATS RBPS Metric 8.5.1 multiple layered defenses - ISO/IEC 27002:2005 B. Implement an IPS to detect malware within inbound network traffic. - NIST SP 800-82 C. All routers should separate enclaves at layer 3, with explicitly defined Access Control Lists (ACLs) NERC CIP-005-4 R3 D. Consider a layered defensive strategy consisting of one or more additional security measures E. Utilize a security event management system (SIEM) to centrally collect and display security events from the electronic security perimeter device(s). 5 points Save Answer Question 4 The CFATS RBPS Metric 8.2.5. Password Management standard includes the following recommendations (choose all that apply). 1. Change privileged account passwords at least once every 30 days 2. Implement a centralized authentication system (Active Directory or a Commercial IAM) to track user authentication requirements. 3. Monitor application contents (either via deep packet inspection via IPS or deep session inspection via an Application Monitor) for instances of weak passwords or known default passwords. 4. Use strong passwords with numbers and upper and lower case letters
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

Quiz questions
Question one
Chemical facil...


Anonymous
I use Studypool every time I need help studying, and it never disappoints.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags