please answer all question carefully. it is very important for me.thank you 1) A
ID: 3891555 • Letter: P
Question
please answer all question carefully. it is very important for me.thank you
1) A company has experienced several security breaches and now wishes to increase the security of the authentication process. There are a large number of domain-based application services on the corporate network, many of which are administered by different departments. A majority of the breaches originated from issues with password management. Employees must remember passwords for the various systems, some of which have different password requirements. As a result, employees began to write down their passwords, and social engineering attacks targeted the overworked help desk. Management wants to make the social engineering attacks against the help desk less effective, while also simplifying password management for the users. Which of the following would BEST accomplish this? (Select TWO)
A) Require all systems to use TOTP key fobs for additional authentication,
B) Change all services to use PAP authentication.
C) Require all systems to use unique PIN numbers for additional authentication
D) Change all services to use Kerberos authentication,
E) Change all services to use CHAP authentication.
F) Require all systems to use MAC.
A cloud service facilitates SSO for multiple third-party services. These third party services all operate using different internal network architectures. Which of the following services would be MOST appropriate to use considering this?
A) SAML
B) XT ACACS
C) Secure LDAP
D) RADIUS
A software development company has developed a patch for its most popular software application. The company has decided to make the patch available for download on the company's public website. In the past, the company has had problems with rogue patches that contain exploitable code circulating to owners of the company's software application. The company has asked an IT security analyst to develop a cryptographic method that would allow customers to know the patch they are applying is authentic. Which of the following would meet this requirement and BEST prevent collision attacks?
A) MD5
B) SHA-256
C) PGP with 1024-bit key
D) AES-128
Explanation / Answer
Please Note: Your Post contains more than one Question. According to Chegg answering guidelines, I have answered the first question. Please Re-Post for others.
1)Which of the following would BEST accomplish this? (Select TWO)
A) Require all systems to use TOTP key fobs for additional authentication,
B) Change all services to use PAP authentication.
C) Require all systems to use unique PIN numbers for additional authentication
D) Change all services to use Kerberos authentication,
E) Change all services to use CHAP authentication.
F) Require all systems to use MAC.
Answer)
A) Require all systems to use TOTP key fobs for additional authentication
E) Change all services to use CHAP authentication
Time based OTP is generated for different users at different timestamps and thus this will be the solution. Also, using CHAP authentication, the users are send a challenge which they must complete before authenticating themselves to the network and thus limiting authentication frauds.
Related Questions
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.