1.A security analyst wants to harden the company’s VoIP PBX. The analyst is worried that credentials may be intercepted and compromised when IP phones authenticate with the BPX.Which of the following would best prevent this from occurring?
A. Implement SRTP between the phones and the PBX.
B. Place the phones and PBX in their own VLAN.
C. Restrict the phone connections to the PBX.
D. Require SIPS on connections to the PBX.
2. An organization is comparing and contrasting migration from its standard desktop configuration to the newest version of the platform. Before this can happen, the Chief Information Security Officer(CISO) voices the need to evaluate the functionality of the newer desktop platform to ensure interoperability with existing software in use by the organization. In which of the following principles of architecture and design is the CISO engaging?
A. Dynamic analysis
B. Change management
3.A security administrator suspects a MITM attack aimed at impersonating the default gateway is underway.Which of the following tools should the administrator use to detect this attack? (Select two.)
4.Which of the following types of attacks precedes the installation of a rootkit on a server?
C. Privilege escalation
5.Which of the following cryptographic algorithms is irreversible?