Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Answers ALL questions carefully please . Thanks 37-To enter a server room, the technician must undergo a fingerprint scan and retina scan. Which of the

Answers ALL questions carefully please . Thanks

image text in transcribed

37-To enter a server room, the technician must undergo a fingerprint scan and retina scan. Which of the following describes this type of authentication? A) Single factor B) Two factor C) Three factor D) Multifactor 38- All users are unable to connect to the company wireless network on a Monday morning, even through it was working on the previous Friday. The company implements 802.1x EAP-EAP-MSCHAPv2, and users receive an expired certificate error on their devices. Which of the following will MOST likely resolve this issue? A) Renewing certificate on the authentication server B) Issuing and pushing new certificate to every user C) Updating the CA certificate on the wireless controller D) Installing a new certificate on the access points. 39- A recent online password audit has identified that passwords are at risk to brute force attacks. Which of the following controls would BEST mitigate this risk? A) Account reviews B) Account lockouts C) Password lengtih D) Password complexity 40- An audit reveals employees have been installing personal software on company workstation. Further investigation does not show any unusual spikes in network traffic to support the theory that software is being downloaded via the internet. The desktop manager suggests removing the employees from the local administrato group on the computers, however, this would cause the monitoring software that runs on the device to stop functioning while those employees are logged into the computers. The human resources department wants the solution to provide user accountability for future disciplinary actions. Which of the following would be the BEST choice to permanently correct this issue? A) Upgrade the web content filter to a device capable of monitoring, scanning, and filtering SSL traffic, and send weekly usage logs to department managers B) Institute an application whitelist that only allows approved programs to be installed on the computers and sends alerts for attempted software installations. C) Implement a DLP solution that automatically blocks all access to devices that utilize the USB port and sends alerts to desktop support when devices are plugged in. D) Add the employees to the domain administrator group on the devices so they can install any key applications, and enable system access logging and alerts. 41- A security administrator wants to configure a website to implement an anonymous key exchange algorithm that will allow for per session keys to be independent of the site certificates. Which of the following should the administrator configure on the web server? A) ECDHE B) RSA C) PBKDF2 D) RC4

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Graph Databases

Authors: Ian Robinson, Jim Webber, Emil Eifrem

1st Edition

1449356265, 978-1449356262

More Books

Students also viewed these Databases questions