ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 405 - CAS-004 discussion

Report
Export

A network security engineer is designing a three-tier web architecture that will allow a third-party vendor to perform the following audit functions within the organization's cloud environment

* Review communication between all infrastructure endpoints

* Identify unauthorized and malicious data patterns

* Perform automated, risk-mitigating configuration changes

Which of the following should the network security engineer include in the design to address these requirements?

A.
Network edge NIPS
Answers
A.
Network edge NIPS
B.
Centralized syslog
Answers
B.
Centralized syslog
C.
Traffic mirroring
Answers
C.
Traffic mirroring
D.
Network flow
Answers
D.
Network flow
Suggested answer: C

Explanation:

Traffic mirroring, also known as port mirroring or SPAN (Switched Port Analyzer), involves creating a copy of the actual network traffic for independent analysis. This would allow the third-party vendor to review communications between infrastructure endpoints, identify unauthorized and malicious data patterns, and perform automated, risk-mitigating configuration changes without impacting the live environment. This is used in network intrusion detection systems (NIDS) and for traffic analysis purposes.

asked 02/10/2024
Andres Mauricio Rodriguez
35 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first