During a recent pandemic, employees from ABC company were allowed to work from home. What security technology should be implemented to ensure that data communications between the employees and the ABC Head Office network remain confidential?

Last Updated on April 30, 2021 by Admin During a recent pandemic, employees from ABC company were allowed to work from home. What security technology should be implemented to ensure that data communications between the employees and the ABC Head Office network remain confidential? a symmetric or asymmetric encryption algorithm such as AES or PKI […]
Continue reading…

 

Refer to the exhibit. A network administrator is configuring DAI on switch SW1. What is the result of entering the exhibited commands?

Last Updated on April 30, 2021 by Admin Refer to the exhibit. A network administrator is configuring DAI on switch SW1. What is the result of entering the exhibited commands? DAI will validate only the IP addresses. DAI will validate only the destination MAC addresses. DAI will validate both source and destination MAC addresses as […]
Continue reading…

 

A company requires the use of 802.1X security. What type of traffic can be sent if the authentication port-control auto command is configured, but the client has not yet been authenticated?

Last Updated on April 30, 2021 by Admin A company requires the use of 802.1X security. What type of traffic can be sent if the authentication port-control auto command is configured, but the client has not yet been authenticated? SNMP EAPOL broadcasts such as ARP any data encrypted with 3DES or AES Answers Explanation & […]
Continue reading…

 

What protocol is used to encapsulate the EAP data between the authenticator and authentication server performing 802.1X authentication?

Last Updated on April 30, 2021 by Admin What protocol is used to encapsulate the EAP data between the authenticator and authentication server performing 802.1X authentication? RADIUS TACACS+ SSH MD5 Answers Explanation & Hints: Encapsulation of EAP data between the authenticator and the authentication server is performed using RADIUS.
Continue reading…

 

A company is concerned about data theft if any of the corporate laptops are stolen. Which Windows tool would the company use to protect the data on the laptops?

Last Updated on April 30, 2021 by Admin A company is concerned about data theft if any of the corporate laptops are stolen. Which Windows tool would the company use to protect the data on the laptops? AMP 802.1X RADIUS BitLocker Answers Explanation & Hints: Storage devices can be encrypted to protect data from unauthorized […]
Continue reading…