IT Security Architect
Apply NowCompany: Synergy America, Inc.
Location: Duluth, GA 30096
Description:
Job Description
Questionnaire
1. Peter works as a Network Administrator for ABC Inc. The company wants to allow remote users to connect and access its private network through a dial-up connection via the Internet. All the data will be sent across a public network. For security reasons, the management wants the data sent through the Internet to be encrypted. The company plans to use a Layer 2 Tunneling Protocol (L2TP) connection. Which communication protocol will Peter use to accomplish the task?
2. You work as a Security Architect for ABC Inc. CEO of the company ordered you to implement two-factor authentication for the employees to access their networks. He has told you that he would like to use some type of hardware device in tandem with a security or identifying pin number. You decides to implement smart cards but they are not cost effective. What type of hardware devices can you use to implement what the CEO wants?
3. Maria works as a Network Security Officer for ABC Inc. She wants to encrypt her network traffic. The specific requirement for the encryption algorithm is that it must be a symmetric key block cipher. Which techniques will she use to fulfill this requirement?
4. The simplest form of a firewall is a packet filtering firewall. Typically a router works as a packet filtering firewall and has the capability to filter on some of the contents of packets. On which of the layers of the OSI reference model do these routers filter information?
5. Andrew works as a Network Administrator for ABC Inc. The company's network has a Web server that hosts the company's Web site. Andrew wants to increase the security of the Web site by implementing Secure Sockets Layer (SSL). Which 2 types of encryption does SSL use? Each correct answer represents a complete solution.
6. You work as an Incident handler in ABC Inc. You have followed the Incident handling process to handle the events and incidents. You identify Denial of Service attack (DOS) from a network linked to your internal enterprise network. Which phase of the Incident handling process should you follow next to handle this incident?
DEBORAH Davis
Questionnaire
1. Peter works as a Network Administrator for ABC Inc. The company wants to allow remote users to connect and access its private network through a dial-up connection via the Internet. All the data will be sent across a public network. For security reasons, the management wants the data sent through the Internet to be encrypted. The company plans to use a Layer 2 Tunneling Protocol (L2TP) connection. Which communication protocol will Peter use to accomplish the task?
2. You work as a Security Architect for ABC Inc. CEO of the company ordered you to implement two-factor authentication for the employees to access their networks. He has told you that he would like to use some type of hardware device in tandem with a security or identifying pin number. You decides to implement smart cards but they are not cost effective. What type of hardware devices can you use to implement what the CEO wants?
3. Maria works as a Network Security Officer for ABC Inc. She wants to encrypt her network traffic. The specific requirement for the encryption algorithm is that it must be a symmetric key block cipher. Which techniques will she use to fulfill this requirement?
4. The simplest form of a firewall is a packet filtering firewall. Typically a router works as a packet filtering firewall and has the capability to filter on some of the contents of packets. On which of the layers of the OSI reference model do these routers filter information?
5. Andrew works as a Network Administrator for ABC Inc. The company's network has a Web server that hosts the company's Web site. Andrew wants to increase the security of the Web site by implementing Secure Sockets Layer (SSL). Which 2 types of encryption does SSL use? Each correct answer represents a complete solution.
6. You work as an Incident handler in ABC Inc. You have followed the Incident handling process to handle the events and incidents. You identify Denial of Service attack (DOS) from a network linked to your internal enterprise network. Which phase of the Incident handling process should you follow next to handle this incident?
DEBORAH Davis