Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Answers ALL questions carefully please . Thanks 33- A company wants to use wireless technology and designated areas for all of its locations throughout the

Answers ALL questions carefully please . Thanks

image text in transcribed

33- A company wants to use wireless technology and designated areas for all of its locations throughout the country. The company will need to accept connections only from its equipment in each of the distribution center, Autonomous vehicles, Inventory scanners, and conveyer build systems. All need the ability to safety connect wirelessly. Which of the following will best allow for security that meets those requirements? A) Install WAPs that will cover the needed area. Deploy at NAC to control access to only authorized end point. Deployed non-directional antennas at required power B) Install WAPs at equal intervals on the property. Deploy at NAC to control access to only authorized end point. Deployed directional antennas at required power C) Install WAPs that will cover the needed area. Deploy at NAC to control access to only authorized end point. Deployed non-directional antenna at required power D) Install WAPs that will cover the needed area. Deploy at NAC to control access to only authorized end pbint. Deployed non-directional antennas at strongest power 34- A network administrator has been tasked with security retrieving a copy of the current running configuration of a network router for an auditor. Which of the following would be the BEST method to retrieve this file? A) Encryption email B) SCP C) HTTP D) TFTP 35- A network administrator has noticed there are many addresses on the network that are not recognized in the device registration logs. Which of the following is the BEST way to solve this problem? A) Adjust the AP power levels. B) Disable the SSID broadcast. C) Switch from TKKIP to CCMP D) implementing MAC address filtering 36- An organization in in the process of implementing a OKI solution for its employees. During the risk analysis phase, it was determent that the handling of the backup key would cost the organization a considerable amount of money due to the additional staffing and build-out of a secure area where the keys will reside. Which of the following would be the BEST course of action moving forward with the PKl project? A) Out-of-band key exchange B) key escrow C) Certificate authority D) In-band-key exchange E) Registration authority

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Intranet And Web Databases For Dummies

Authors: Paul Litwin

1st Edition

0764502212, 9780764502217

More Books

Students also viewed these Databases questions