Please answer the ALL the questions carefully. Thanks 15- Management at a bank t
ID: 3714028 • Letter: P
Question
Please answer the ALL the questions carefully. Thanks
15- Management at a bank tasked a security administrator with setting up a secure wireless network. Wireless encryption must be a strongest type of encryption available. These wireless device will be handling financial transaction data. For security reasons, the administrator wishes to prevent authenticated wireless devices from eavesdropping on other devices sharing their wireless network. Which of the following network standaro would best meet those requirement A) WPA2 Enterprise B) WPA with a TKIP passphrase C)WPA2 with AES passphrase D) EAP over LAN 16- A company wants to use wireless technology and designated areas for all of its locations throughout the country. The company will need to accept connections only from its equipment in each of the distribution center Autonomous vehicles, Inventory scanners, and conveyer build systems. All need the ability to safety connect wirelessly. Which of the following will best allow for security that meets those requirements? A) Install WAPs that will cover the needed area. Deploy at NAC to control access to only authorized end point. Deployed non-directional antenna at required power B) Install WAPs at equal intervals on the property. Deploy at NAC to control access to only authorized end point. Deployed non-directional antenna at strongest power C) Install WAPs that will cover the needed area. Deploy at NAC to control access to only authorized end point. Deployed non-directional antenna at required power D) Install WAPs that will cover the needed area. Deploy at NAC to control access to only authorized end point. Deployed non-directional antenna at strongest power 17- A customer has been the victim of repeated DoS attacks where the attacker used the outage to impersonate users for the corporation. Which of the following administrative controls should the security engineer focus on implementing to mitigate at impersonations? A) Multi-factor authentication B) social engineering training C) Digital signatures for email D) Federated identity management 18- An organization requires secure remote access for configuration and maintenance on network devices such as switches and firewalls. Which of the following protocols would meet this objective in the most secure manner A) SNMPv3 B) IPSec C) Telnet D) SFTP 19- A security administrator has put together a scenario - based exercises to identify what the emergency response team would do in case of fire in the datacenter. This is an example of? A) a risk assessment plan. B) a tabletop exercise C) a hot site backup plan. D) business impact analysisExplanation / Answer
15.) WPA2 with AES paraphrase
16.) Install WAPs that will cover the needed area. Deploy at NAC to control access to only authorized end point. Deploy non-directional antenna at required power.
17.) Federated Identity Management.
18.) SNMPv3
19.) a hot site backup plan
Hence, these are the reasons to the above answers.