Course Hero Logo

A eap fast b eap tls c peap d eap ttls 64 you work at

Course Hero uses AI to attempt to automatically extract content from documents to surface to you and others so you can study better, e.g., in search results, to enrich docs, and more. This preview shows page 234 - 237 out of 324 pages.

A.EAP-FASTB.EAP-TLSC.PEAPD.EAP-TTLS64.You work at a large company. You are concerned about ensuring that all workstations havea common configuration, that no rogue software is installed, and that all patches are kept upto date. Which of the following would be the most effective for accomplishing this?A.Use VDI.B.Implement restrictive policies.C.Use an image for all workstations.D.Implement strong patch management.65.Naomi has deployed herorganization’scloud-based virtual datacenters to multiple Googledatacenter locations around the globe. What does this design provide for her systems?A.Resistance to insider attacksB.High availability across multiple zones
Implementation95C.Decreased costsD.Vendor diversity66.Patrick wants to deploy a virtual private networking (VPN) technology that is as easy for endusers to use as possible. What type of VPN should he deploy?A.An IPSec VPNB.An SSL/TLS VPNC.An HTML5 L2TP VPND.An SAML VPN67.Olivia is responsible for web application security for hercompany’se-commerce server. She isparticularly concerned about XSS and SQL injection. Which technique would be mosteffective in mitigating these attacks?A.Proper error handlingB.The use of stored proceduresC.Proper input validationD.Code signing68.Isaac wants to prevent corporate mobile devices from being used outside of his company’sbuildings and corporate campus. What mobile device management (MDM) capability shouldhe use to allow this?A.Patch managementB.IP filteringC.GeofencingD.Network restrictions69.Sophia wants to test hercompany’sweb application to see if it is handling input validationand data validation properly. Which testing method would be most effective for this?A.Static code analysisB.FuzzingC.BaseliningD.Version control70.Alaina has implemented an HSM. Which of the following capabilities is not a typicalHSM feature?A.Encryption and decryption for digital signaturesB.Boot attestationC.Secure management of digital keysD.Strong authentication support
96Chapter 3Implementation71.Cynthia wants to issue contactless cards to provide access to the buildings she is tasked withsecuring. Which of the following technologies should she deploy?A.RFIDB.Wi-FiC.MagstripeD.HOTP72.Alaina wants to prevent bulk gathering of email addresses and other directory informationfrom her web-exposed LDAP directory. Which of the following solutions would not helpwith this?A.Using a back-off algorithmB.Implementing LDAPSC.Requiring authenticationD.Rate limiting queries73.Alaina has been told that her organization uses a SAN certificate in their environment. Whatdoes this tell Alaina about the certificate in use in her organization?A.It is used for a storage area network.B.It is provided by SANS, a network security organization.

Upload your study docs or become a

Course Hero member to access this document

Upload your study docs or become a

Course Hero member to access this document

End of preview. Want to read all 324 pages?

Upload your study docs or become a

Course Hero member to access this document

Term
Spring
Professor
N/A
Tags

Newly uploaded documents

Show More

Newly uploaded documents

Show More

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture