Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Please answer the ALL the questions carefully. Thanks 15- Management at a bank tasked a security administrator with setting up a secure wireless network. Wireless

Please answer the ALL the questions carefully. Thanks

image text in transcribed

15- Management at a bank tasked a security administrator with setting up a secure wireless network. Wireless encryption must be a strongest type of encryption available. These wireless device will be handling financial transaction data. For security reasons, the administrator wishes to prevent authenticated wireless devices from eavesdropping on other devices sharing their wireless network. Which of the following network standaro would best meet those requirement A) WPA2 Enterprise B) WPA with a TKIP passphrase C)WPA2 with AES passphrase D) EAP over LAN 16- A company wants to use wireless technology and designated areas for all of its locations throughout the country. The company will need to accept connections only from its equipment in each of the distribution center Autonomous vehicles, Inventory scanners, and conveyer build systems. All need the ability to safety connect wirelessly. Which of the following will best allow for security that meets those requirements? A) Install WAPs that will cover the needed area. Deploy at NAC to control access to only authorized end point. Deployed non-directional antenna at required power B) Install WAPs at equal intervals on the property. Deploy at NAC to control access to only authorized end point. Deployed non-directional antenna at strongest power C) Install WAPs that will cover the needed area. Deploy at NAC to control access to only authorized end point. Deployed non-directional antenna at required power D) Install WAPs that will cover the needed area. Deploy at NAC to control access to only authorized end point. Deployed non-directional antenna at strongest power 17- A customer has been the victim of repeated DoS attacks where the attacker used the outage to impersonate users for the corporation. Which of the following administrative controls should the security engineer focus on implementing to mitigate at impersonations? A) Multi-factor authentication B) social engineering training C) Digital signatures for email D) Federated identity management 18- An organization requires secure remote access for configuration and maintenance on network devices such as switches and firewalls. Which of the following protocols would meet this objective in the most secure manner A) SNMPv3 B) IPSec C) Telnet D) SFTP 19- A security administrator has put together a scenario - based exercises to identify what the emergency response team would do in case of fire in the datacenter. This is an example of? A) a risk assessment plan. B) a tabletop exercise C) a hot site backup plan. D) business impact analysis

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Students also viewed these Databases questions

Question

=+j Explain IHRMs role in global HR research.

Answered: 1 week ago

Question

=+j Describe an effective crisis management program.

Answered: 1 week ago