Which of the following will you use to accomplish the task?

You work as a Network Administrator for uCertify Inc. You want the clients and servers in your organization to be able to communicate in a way that prevents eavesdropping and tampering of data on the Internet. Which of the following will you use to accomplish the task?

You work as a Network Administrator for uCertify Inc. You want the clients and servers in your organization to be able to communicate in a way that prevents eavesdropping and tampering of data on the Internet. Which of the following will you use to accomplish the task?

A.
EFS

B.
WEP

C.
SSL

D.
MS-CHAP

Explanation:
In order to accomplish the task, you should use SSL in the organization’s network. Secure Sockets Layer (SSL) is a protocol used to transmit private documents via the internet. SSL uses a combination of public key and symmetric encryption to provide communication privacy, authentication, and message integrity. Using the SSL protocol, clients and servers can communicate in a way that prevents eavesdropping and tampering of data on the Internet. Many Web sites use the SSL protocol to obtain confidential user information, such as credit card numbers. By convention, URLs that require an SSL connection start with https: instead of http:. By default, SSL uses port 443 for secured communication.

Answer option B is incorrect. Wired Equivalent Privacy (WEP) is a security protocol for wireless local area networks (WLANs). It has two components, i.e., authentication and encryption. It provides security for wireless networks. WEP encrypts data on a wireless network by using a fixed secret key. WEP incorporates a checksum in each frame to provide protection against the attacks that attempt to reveal the key stream.

Answer option 0 is incorrect. Microsoft Challenge Handshake Authentication Protocol version 2 (MS-CHAP v2) is the new version of MS-CHAP. MS-CHAP v2 provides the highest level of security and encryption for dial-up connection in the environment consisting of both Windows NT and Windows 2000/XP dial-up clients. It provides mutual authentication, stronger initial data encryption keys, and different encryption keys for sending and receiving data.

Answer option A is incorrect. Encrypting File System (EFS) is used to encrypt sensitive data in files stored on disks using the NTFS file system. EFS is easy to manage, difficult to hack, andtransparent to the owner of a file and to applications because it runs as an integrated system service. Only the owner of a protected file can open the file and work on it. Using EFS involves a minimum of administrative effort.



Leave a Reply 0

Your email address will not be published. Required fields are marked *