Which of the following encrypts data a single bit at a time?
Which of the following encrypts data a single bit at a time?
which of the following would be the BEST method for reducing the risk of having the laptops compromised?
A business has recently deployed laptops to all sales employees. The laptops will be used primarily from
home offices and while traveling, and a high amount of wireless mobile use is expected. To protect the
laptops while connected to untrusted wireless networks, which of the following would be the BEST
method for reducing the risk of having the laptops compromised?
Which of the following encryption solutions should be deployed in this situation?
A Security Officer on a military base needs to encrypt several smart phones that will be going into
the field. Which of the following encryption solutions should be deployed in this situation?
Which of the following is the reason the manager installed the racks this way?
A network operations manager has added a second row of server racks in the datacenter. These racks
face the opposite direction of the first row of racks. Which of the following is the reason the manager
installed the racks this way?
You need to eliminate the redundancy while maintaining three-factor authentication…
SIMULATION
You have just received some room and WiFi access control recommendations from a security consulting
company. Click on each building to bring up available security controls. Please implement the following
requirements:
The Chief Executive Officer’s (CEO) office had multiple redundant security measures installed on the door
to the office. Remove unnecessary redundancies to deploy three-factor authentication, while retaining
the expensive iris render.
The Public Cafe has wireless available to customers. You need to secure the WAP with WPA and place a
passphrase on the customer receipts.
In the Data Center you need to include authentication from the “something you know” category and take
advantage of the existing smartcard reader on the door.
In the Help Desk Office you need to require single factor authentication through the use of physical
tokens given to guests by the receptionist.
The PII Office has redundant security measures in place. You need to eliminate the redundancy while
maintaining three-factor authentication and retaining the more expensive controls.
Instructions: The original security controls for each office can be reset at anytime by selecting the Reset
button. Once you have met the above requirements for each office, select the Save button.
When you have completed the entire simulation, please select the Done button to submit. Once the
simulation is submitted, please select the Next button to continue.