Which of the following will Mark use to accomplish the task?

Mark work as a System Administrator for TechMart Inc. The company has a Windows-based
network. Mark wants to allow the remote travel agents to be able to access the corporate network
so that they are free to check email and post appointments that are booked for the particular day.
Mark has decided to permit the travel agents to use their home computers but he is required to be
assured that the information is not compromised by anyone because the security of client
information is on the top priority for him. Which of the following will Mark use to accomplish the
task?

Mark work as a System Administrator for TechMart Inc. The company has a Windows-based
network. Mark wants to allow the remote travel agents to be able to access the corporate network
so that they are free to check email and post appointments that are booked for the particular day.
Mark has decided to permit the travel agents to use their home computers but he is required to be
assured that the information is not compromised by anyone because the security of client
information is on the top priority for him. Which of the following will Mark use to accomplish the
task?

A.
Implement the principle of least privilege that permits the travel agents for remote access.

B.
Implement a Wi-Fi Protected Access that permits the travel agents for remote access.

C.
Implement a Wired Equivalent Privacy that permits the travel agents for remote access.

D.
Implement a VPN server that permits the travel agents for remote access.

Explanation:
In the above scenario, it is required to implement a VPN server to permit the travel agents remote
access without compromising the security because VPN can be used to use several methods of
encryption.
interception by a third party in Wireless Networking. Data can be protected by using encryption
technologies. In Wireless Networking Connection, various methods are used to increase security as
follows:
Using Wired Equivalent Privacy: The goal is to allow only authorized users to connect to the wireless
network. While initially configuring routers and network adapters, users create a WEP key. The level
of security depends on the length of the key measured in bits. Another step is to share WEP keys to
authorized users. Specifically, it is possible for unauthorized users to determine the mathematical
value of a WEP key by monitoring a sufficient amount of networking traffic. WEP is an additional
security, but it does not completely address all potential vulnerabilities.
Using Wi-Fi Protected Access: The Wi-Fi Protected Access protocol is used to provide higher security
over the WEP standard. It is considered as a replacement for the less secured WEP protocol. WPA
security is configured on a wireless router or an access point.
Using Service Set Identifiers: Service Set Identifiers are used to assist users to find and connect to a
wireless network. Whenever a wireless network adapter is available on a computer, Windows Vista
automatically identifies the available networks based on their SSID.

essential to do his/her work. In information security, computer science, and other fields, the
principle of least privilege, is also known as the principle of minimal privilege or least privilege. It
define that in a particular abstraction layer of a computing environment, every module has to be
able to access only the information and resources that are essential for its legitimate purpose. It
needs that each subject in a system be granted the most restrictive set of privileges required for the
authorized tasks.



Leave a Reply 1

Your email address will not be published. Required fields are marked *


Andras

Andras

The correct answer is D.