1. A systems administrator has installed a new UTM that is capable of inspecting SSL/TLS traffic for malicious payloads. All inbound network traffic coming from the internet and terminating on the company's secure web servers must be inspected. Which of the following configurations would best support this requirement?
A. The web servers’ CA full certificate chain must be installed on the UTM
B. The UTM’s certificate pair must be installed on the web servers
C. The web servers’ privet certificate must be installed on the UTM
D. The UTM and web server must use the same certificate authority
2. A company has migrated to two-factor authentication for accessing the corporate network, VPN, and SSO. Several legacy applications cannot support multifactor authentication and must continue to use usernames and passwords. Which of the following should be implemented to ensure the legacy applications are as secure as possible while ensuring functionality?
A. Privileged accounts
B. Password reuse restrictions
C. Password complexity requirements
D. Password history
E. Password recovery
F. Account disablement

Respuesta :

Answer:

1 Option(A) is the correct answer .

2 Option(A) and Option(B) is the correct answer .

Explanation:

1

In this the administrator of the system built the new UTM capable of reviewing the  SSL / TLS flow for the suspicious payloads it see that the both inbound traffic flow originating from both the web and stopping on protected application server of the business .The full CA certificate sequence of web servers should be built on a UTM configuration will solve the problem .

2

The Two-factor authentication is used for the security purpose .In this technique only authorized people will accessing the data  the unauthorized people is not accessing the data.

  • The main objective of  two-factor authentication it provide the better security then the other security .
  • The  Two-factor authentication is ensuring the security of Privileged accounts as well as the reuse restrictions of the password