Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Please answer ALL the questions carefully. Thanks 20- A Security administrator wants to implement a solution to encrypt all communications between the company's servers and

Please answer ALL the questions carefully. Thanks

image text in transcribed

20- A Security administrator wants to implement a solution to encrypt all communications between the company's servers and client workstations. The solution must account for protocols at Layers 4 through 7 of the OSI model Which of the following should be implemented? ?) iSCSI B) SSH C) IPSec D) SCP 21- which of the following is susceptible on an attack that can obtain the wireless password by brute-forcing a four- digit PIN followed by three-digit PIN A) WPA B) WPS C) WEP D) WPA2 22- A company implemented a new wireless network that supports PEAP, and EAP- FAST, which authenticate users with their regular usernames and passwords for the wired network. During testing, users were unable to connect to the wireless network. Their devices failed to associate with the access point, and uses received a message that the association was untrusted. Which of the following should the company do to remedy this wireless network issue? A) Require users to register their wireless card MAC addresses with IT support before trying to connect the system. B) Allow users to authenticate to the local Ads rather than utilizing a back-end identity store. C) Utilize a commercially available, CA-issued certificate to be used during the client connection process. D) Disseminate a preshared key for use during the AP association phase of the connection 23- A Development company intends to market its OS project towards high-security users. When designing the kernel's security architecture, the development team begins to map out specific object and determine which subject will need to be able to access those objects. The team defines specific security domains that provided the context for this access control. Which of the following represents the access control object the development team is trying to achieve? A) MAC B) Rule-based access control C) DAC D) Role-based access control 24- A company's Linux password policy states that password must be 15 characters long, have special symbols, not be found that dictionary, never be used, and expire every 30 days. The manager is concerned that these difficult-to-remember password will be written down or stored insecurely. Which of the following would address the manager's concern in the MOST secure manner? A) Disable password authentication and implement certificate-based authentication. B) Replace the username and password login with a single PIN C) Enable an additional authentication factor with a a secure software token. D) Implement a secure dictionary-based authentication system for each server

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

More Books

Students also viewed these Databases questions

Question

2. Employees and managers participate in development of the system.

Answered: 1 week ago