Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Eccouncil Exam 212-82 Topic 5 Question 54 Discussion

Actual exam question for Eccouncil's 212-82 exam
Question #: 54
Topic #: 5
[All 212-82 Questions]

You are the chief cybersecurity officer at a multi-national corporation, which specializes in satellite-based communication systems. Recently, you transitioned to a more advanced system architecture that includes multiple ground stations globally. These stations synchronize and communicate via a central hub that manages the distribution of encrypted data across the network. Upon reviewing the quarterly network logs, you uncover a series of sophisticated intrusions. These intrusions are intermittently taking place inground stations located in three continents. Evidence suggests that these attacks are coordinated, aiming to map out the network's communication paths, likely in preparation for a much larger scale cyber-attack. Further investigation uncovers small pockets of malware within the system, specifically designed to circumvent your current security controls. Given the criticality of ensuring uninterrupted satellite communication, which countermeasure would be most effective in thwarting these intrusions, ensuring data integrity, and maintaining the operational status of your satellite communication systems?

Show Suggested Answer Hide Answer
Suggested Answer: C

Network Segmentation:

Network segmentation involves dividing the network into smaller, isolated segments, each with its own security policies and controls. This limits the spread of malware and unauthorized access.


Micro-Segmentation:

Micro-segmentation takes this further by creating even smaller segments within each ground station, ensuring that even if one segment is compromised, the others remain secure.

Real-Time Threat Monitoring:

Deploying real-time threat monitoring allows for the detection and response to threats as they occur, providing a dynamic and adaptive security posture.

Dynamic Policy Adjustments:

Implementing policies that can adjust in real-time based on detected threats ensures that the network remains resilient against ongoing and evolving attacks.

By adopting an advanced network segmentation strategy with real-time monitoring and dynamic policy adjustments, the corporation can effectively counter sophisticated intrusions and ensure the integrity and operational status of its satellite communication systems.

Contribute your Thoughts:

Britt
13 hours ago
While endpoint security is important, these coordinated attacks seem to be targeting the network itself. I'd go with option C to create a more resilient and secure architecture.
upvoted 0 times
...
Sue
5 days ago
I see both points, but I think option B might be the safest bet. Air-gapped systems can truly isolate the stations from external threats.
upvoted 0 times
...
Wenona
9 days ago
I disagree, I believe option C is more suitable. Network segmentation can provide better protection and real-time monitoring.
upvoted 0 times
...
Kristel
15 days ago
I think option C is the best way to go. Implementing a robust network segmentation strategy will help contain the damage and allow for better threat monitoring and response.
upvoted 0 times
Denny
4 days ago
B) Implement air-gapped systems for each ground station to ensure complete isolation, minimizing the risk of malware spread and external intrusions.
upvoted 0 times
...
Raymon
10 days ago
A) Enhance end-point security solutions at each ground station, focusing on advanced malware detection, eradication, and prevention.
upvoted 0 times
...
...
Hailey
16 days ago
I think option A is the best choice. Enhancing end-point security can help detect and prevent malware effectively.
upvoted 0 times
...

Save Cancel