Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Please solve both Questions carefully.. Thanks 47- A Security team wishes to use

ID: 3906886 • Letter: P

Question

Please solve both Questions carefully.. Thanks

47- A Security team wishes to use a non- proprietary authentication system that operates with the connection- oriented protocols. Which of the following authentication and authorization protocols would support this requirement? A) RADIUS B) XTACACS C) TACACS+ D) DIAMETER 48- An organization adopted a BYOD policy that allows employees to bring their personal laptops to work and only connect to the wireless network. The human resources department has received a complaint from supervisor about an employee who spend too much time on non-work related activities. The human resources decide to submit a request to the IT security department to revoke the employee's BYOD privileges. Which of the fooling in the BEST mitigation technique the IT security department shout use two fulfill this request? A) Add the MAC addresses for the employee's personal devices to a filter. B) Add the IP addresses for the employee's persona devices to filter C) Revoke the Kerberos tickets assigned to the employee's personal devices.

Explanation / Answer

Answer 47: Terminal Access Controller Access-Control System Plus (TACACS+) is a protocol developed by Cisco.TACACS+ uses TCP. TCP offers connection oriented protocols.

Answer 48: Revoke the WAP2 enterprise credentials assigned to employee's personal devices