Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Please answer carfully. Thank you A security administrator wants to configure a

ID: 3910141 • Letter: P

Question

Please answer carfully.

Thank you

A security administrator wants to configure a website to implement an anonymous key exchange algorithm that will allow for per session keys to be independent of the site certificates, Which of the following should the administrator configure on the web server'? A) ECDHE B) RSA C) PBKDF2 D) RC4

An audit reveals employees have been installing personal software on company workstations, Further investigation does not show any unusual spikes in network traffic to support the theory that software is being downloaded via the Internet, The desktop manager suggests removing the employees from the local administrator group on the computers; however, this would cause the monitoring software that runs on the devices to stop functioning while those employees are logged into the computers, The human resources department wants the solution to provide user accountability for future disciplinary actions, Which of the following would be the BEST choice to permanently correct this issue?

A) Upgrade the web content filter to a device capable of monitoring, scanning, and filtering SSL traffic, and send weekly usage logs to department managers,

B) Institute an application whitelist that only allows approved programs to be installed on the computers and sends alerts for attempted software installations,

C) Implement a DLP solution that automatically blocks all access to devices that utilize the USB ports and sends alerts to desktop support when devices are plugged in,

D) Add the employees to the domain administrators group on the devices so they can install any key applications, and enable system access logging and alerts,

Explanation / Answer

1st Part

The primary requirement is anonymous key exchange algorithm that will allow for per session keys to be independent of the site certificates therefore we will use ECDHE . Elliptic-curve Diffie–Hellman (ECDHE) an anonymous key agreement protocol that allows two parties, each having an elliptic-curve public–private key pair, to establish a shared secret over an insecure channel.

2nd Part

B) Institute an application whitelist that only allows approved programs to be installed on the computers and sends alerts for attempted software installations.

Explaination: In this case we observe that there is no unsual spike in network traffic to support the theory that software is being downloaded via the internet. Also one of the objective to achive is user accountability for future disciplinary actions. Hence keeping a approved whitelist of programs that can be installed in the computer and having alerts for attempted software installation will provide the accountability required for future disciplinary action.