Answered step by step
Verified Expert Solution
Question
1 Approved Answer
Answers ALL questions carefully please . Thanks 33- A company wants to use wireless technology and designated areas for all of its locations throughout the
Answers ALL questions carefully please . Thanks
33- A company wants to use wireless technology and designated areas for all of its locations throughout the country. The company will need to accept connections only from its equipment in each of the distribution center, Autonomous vehicles, Inventory scanners, and conveyer build systems. All need the ability to safety connect wirelessly. Which of the following will best allow for security that meets those requirements? A) Install WAPs that will cover the needed area. Deploy at NAC to control access to only authorized end point. Deployed non-directional antennas at required power B) Install WAPs at equal intervals on the property. Deploy at NAC to control access to only authorized end point. Deployed directional antennas at required power C) Install WAPs that will cover the needed area. Deploy at NAC to control access to only authorized end point. Deployed non-directional antenna at required power D) Install WAPs that will cover the needed area. Deploy at NAC to control access to only authorized end pbint. Deployed non-directional antennas at strongest power 34- A network administrator has been tasked with security retrieving a copy of the current running configuration of a network router for an auditor. Which of the following would be the BEST method to retrieve this file? A) Encryption email B) SCP C) HTTP D) TFTP 35- A network administrator has noticed there are many addresses on the network that are not recognized in the device registration logs. Which of the following is the BEST way to solve this problem? A) Adjust the AP power levels. B) Disable the SSID broadcast. C) Switch from TKKIP to CCMP D) implementing MAC address filtering 36- An organization in in the process of implementing a OKI solution for its employees. During the risk analysis phase, it was determent that the handling of the backup key would cost the organization a considerable amount of money due to the additional staffing and build-out of a secure area where the keys will reside. Which of the following would be the BEST course of action moving forward with the PKl project? A) Out-of-band key exchange B) key escrow C) Certificate authority D) In-band-key exchange E) Registration authorityStep by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started