Question 146

A security analyst has been tasked with creating a new WiFi network for the company. The requirements received by the analyst are as follows:
* Must be able to differentiate between users connected to WiFi
* The encryption keys need to change routinely without interrupting the users or forcing reauthentication
* Must be able to integrate with RADIUS
* Must not have any open SSIDs
Which of the following options BEST accommodates these requirements?
  • Question 147

    A healthcare company is revamping its IT strategy in light of recent regulations. The company is concerned about compliance and wants to use a pay-per-use model.
    Which of the following is the BEST solution?
  • Question 148

    Security analysts are conducting an investigation of an attack that occurred inside the organization's network.
    An attacker was able to connect network traffic between workstation throughout the network. The analysts review the following logs:

    The layer 2 address table has hundred of entries similar to the ones above. Which of the following attacks has MOST likely occurred?
  • Question 149

    A network administrator would like to configure a site-to-site VPN utilizing iPSec. The administrator wants the tunnel to be established with data integrity encryption, authentication and anti- replay functions Which of the following should the administrator use when configuring the VPN?
  • Question 150

    A security analyst is Investigating a malware incident at a company. The malware Is accessing a command-and-control website at www.comptia.com. All outbound Internet traffic is logged to a syslog server and stored in /logfiles/messages.
    Which of the following commands would be BEST for the analyst to use on the syslog server to search for recent traffic to the command-and-control website?