Answered step by step
Verified Expert Solution
Question
1 Approved Answer
Please answer the ALL the questions carefully. Thanks 15- Management at a bank tasked a security administrator with setting up a secure wireless network. Wireless
Please answer the ALL the questions carefully. Thanks
15- Management at a bank tasked a security administrator with setting up a secure wireless network. Wireless encryption must be a strongest type of encryption available. These wireless device will be handling financial transaction data. For security reasons, the administrator wishes to prevent authenticated wireless devices from eavesdropping on other devices sharing their wireless network. Which of the following network standaro would best meet those requirement A) WPA2 Enterprise B) WPA with a TKIP passphrase C)WPA2 with AES passphrase D) EAP over LAN 16- A company wants to use wireless technology and designated areas for all of its locations throughout the country. The company will need to accept connections only from its equipment in each of the distribution center Autonomous vehicles, Inventory scanners, and conveyer build systems. All need the ability to safety connect wirelessly. Which of the following will best allow for security that meets those requirements? A) Install WAPs that will cover the needed area. Deploy at NAC to control access to only authorized end point. Deployed non-directional antenna at required power B) Install WAPs at equal intervals on the property. Deploy at NAC to control access to only authorized end point. Deployed non-directional antenna at strongest power C) Install WAPs that will cover the needed area. Deploy at NAC to control access to only authorized end point. Deployed non-directional antenna at required power D) Install WAPs that will cover the needed area. Deploy at NAC to control access to only authorized end point. Deployed non-directional antenna at strongest power 17- A customer has been the victim of repeated DoS attacks where the attacker used the outage to impersonate users for the corporation. Which of the following administrative controls should the security engineer focus on implementing to mitigate at impersonations? A) Multi-factor authentication B) social engineering training C) Digital signatures for email D) Federated identity management 18- An organization requires secure remote access for configuration and maintenance on network devices such as switches and firewalls. Which of the following protocols would meet this objective in the most secure manner A) SNMPv3 B) IPSec C) Telnet D) SFTP 19- A security administrator has put together a scenario - based exercises to identify what the emergency response team would do in case of fire in the datacenter. This is an example of? A) a risk assessment plan. B) a tabletop exercise C) a hot site backup plan. D) business impact analysisStep by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started