Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

ENCRYPTION POLICES

Posted on 2011-02-22
3
Medium Priority
?
382 Views
Last Modified: 2012-05-11
The users in the accounting department use their client computers to access
confidential files over the network. The files must not be altered by unauthorized
users as the files traverse the network.
You need to secure the data transmissions to and from client computers in the
accounting department. You also need to be able to monitor the traffic on the
network and report to IT management the percentage of bandwidth used for each
protocol. Your action to be?
A. Use IPSec encryption
B. Use Server Message Block (SMB) signing
C. Use NTLMv2 authentication
D. Use the Kerberos version 5 authentication protocol

/////////////////////

IPSEC is the most secure one and I agree with it.
0
Comment
Question by:kunalclk
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 3

Accepted Solution

by:
Freaky_Friday earned 1000 total points
ID: 34957174
Hello Kunalclk,

That question looks like it's from an exam. I recently had very good luck with the free test simulators on www.examcollection.com. They have literally thousands of virtual exam sims that are very accurate.

I'm pretty sure it's Kerberos, since it's a windows network and you want to be able to monitor the traffic (port 88). http://en.wikipedia.org/wiki/Kerberos_(protocol)

-Friday
0
 
LVL 39

Assisted Solution

by:Krzysztof Pytko
Krzysztof Pytko earned 1000 total points
ID: 34958464
Yes, IPSEC (A answer) is correct. To monitor traffic Microsoft Network Monitor can be used.
IPSec allows for
Authentication Header (AH) which tells that packet sent from client wasn't tampered but data is not encrypted
Encapsulating Security Payload (ESP) tells the same but additionally encrypts data, so it cannot be intercepted (because of unreadable content)

Regards,
Krzysztof
0
 
LVL 2

Author Closing Comment

by:kunalclk
ID: 34963651
Thanks a lot, also shall use friday.
0

Featured Post

Ransomware: The New Cyber Threat & How to Stop It

This infographic explains ransomware, type of malware that blocks access to your files or your systems and holds them hostage until a ransom is paid. It also examines the different types of ransomware and explains what you can do to thwart this sinister online threat.  

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Resolving an irritating Remote Desktop connection that stops your saved credentials from being used.
In the absence of a fully-fledged GPO Management product like AGPM, the script in this article will provide you with a simple way to watch the domain (or a select OU) for GPOs changes and automatically take backups when policies are added, removed o…
This tutorial will walk an individual through locating and launching the BEUtility application to properly change the service account username and\or password in situation where it may be necessary or where the password has been inadvertently change…
This tutorial will walk an individual through the process of configuring their Windows Server 2012 domain controller to synchronize its time with a trusted, external resource. Use Google, Bing, or other preferred search engine to locate trusted NTP …
Suggested Courses

670 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question