Exam GCIH All QuestionsBrowse all questions from this exam
Question 46

Adam works as a Security Administrator for Umbrella Technology Inc. He reported a breach in security to his senior members, stating that "security defenses has been breached and exploited for 2 weeks by hackers." The hackers had accessed and downloaded 50,000 addresses containing customer credit cards and passwords. Umbrella Technology was looking to law enforcement officials to protect their intellectual property.

The intruder entered through an employee's home machine, which was connected to Umbrella Technology's corporate VPN network. The application called

BEAST Trojan was used in the attack to open a "back door" allowing the hackers undetected access. The security breach was discovered when customers complained about the usage of their credit cards without their knowledge.

The hackers were traced back to Shanghai, China through e-mail address evidence. The credit card information was sent to that same e-mail address. The passwords allowed the hackers to access Umbrella Technology's network from a remote location, posing as employees.

Which of the following actions can Adam perform to prevent such attacks from occurring in future?

    Correct Answer: A

    Allowing VPN access but replacing the standard authentication with biometric authentication is the most effective measure to enhance security in this scenario. Biometric authentication provides a higher security level than standard passwords because it uses unique biological characteristics that are much harder to replicate or steal. This measure addresses the root cause of the attack by improving the authentication process without completely disabling VPN access, which is vital for employees to work remotely.

Discussion
tp9222Option: D

A and D A. Allow VPN access but replace the standard authentication with biometric authentication: Implementing biometric authentication adds an extra layer of security by requiring unique biological characteristics for authentication, which are harder to replicate than passwords. D. Apply different security policy to make passwords of employees more complex: Implementing stronger password policies, such as requiring longer and more complex passwords, can increase the security of user accounts and make them less vulnerable to password guessing and brute-force attacks. So, both options C will disrupt company opeations