Pease answer ALL questions carefully 48- An organization adopted a BYOD policy t
ID: 3721781 • Letter: P
Question
Pease answer ALL questions carefully
48- An organization adopted a BYOD policy that allows employees to bring their personal laptops to work and only connect to the wireless network. The human resources department has received a complaint from supervisor about an employee who spend too much time on non-work related activities. The human resources decide to submit a request to the IT security department to revoke the employee's BYOD privileges. Which of the fooling in the BEST mitigation technique the IT security department shout use two fulfill this request? A) Add the MAC addresses for the employee's personal devices to a filter. B) Add the IP addresses for the employee's persona devices to filter C) Revoke the Kerberos tickets assigned to the employee's personal devices. D) Revoke the WPA2 enterprise credentials assigned to the employee's personal devices. 49- A corporation users TLS certifications to create IPSec tunnels to connect multiple retail locations to the corporate headquarters. The company also utilizes OCSP. Some of the information transferred over the IPSec tunnels plain-text credit card data. Management is worried that a compromised private key might allow attackers to decrypt previously transmitted traffic and expose this credit card information in the future. Which of the following cryptographic concept would BEST mitigate this threat? A) Use SHA-1 as the hashing algorithm for the ISAKMP sessions. B) Use PFS on the IPSec tunnels. C) Use the strongest possible AES encryption on the IPSec tunnels D) Use an out-of - band key exchange to exchange the public key 50- A server administrator recently implemented file system ACLs on a web server. The webmaster now reports the following messages. bash: vim: Permission denied Which of the commands will assist in resolving the problem? A) cacla B) Is Is C) setfacl D) getfacl 53- A security administrator needs to assess the security posture of a network using the least invasive means possible. Which of the following BEST accomplishes this goal? A) Code review B) white box testing C) penetration testing D) Vulnerability scanningExplanation / Answer
48) A) The IT personnell must add the MAC address of the machine of the employee in the BYOD blocked list, such that the same cannot be used to access the connectivity provided by WiFi network.
49) B) Using PFS in IPSec tunnels can address this issue, since Perfect Forward Secrecy protocol ensures that a session key derived from a set of long term keys cannot be compromised if one of the long term keys is compromised in the future.
50)D) getfacl, can be used to determine permissions for the file systems, and then these complex permissions can be altered for the suitable needs
53) D) Vulnerabilty Testing, ensures a least invasive manner without much of the overhead, by testing for the vulnerability of the network towards different threats.
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.