Solved

ENCRYPTION POLICES

Posted on 2011-02-22
3
381 Views
Last Modified: 2012-05-11
The users in the accounting department use their client computers to access
confidential files over the network. The files must not be altered by unauthorized
users as the files traverse the network.
You need to secure the data transmissions to and from client computers in the
accounting department. You also need to be able to monitor the traffic on the
network and report to IT management the percentage of bandwidth used for each
protocol. Your action to be?
A. Use IPSec encryption
B. Use Server Message Block (SMB) signing
C. Use NTLMv2 authentication
D. Use the Kerberos version 5 authentication protocol

/////////////////////

IPSEC is the most secure one and I agree with it.
0
Comment
Question by:kunalclk
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 3

Accepted Solution

by:
Freaky_Friday earned 250 total points
ID: 34957174
Hello Kunalclk,

That question looks like it's from an exam. I recently had very good luck with the free test simulators on www.examcollection.com. They have literally thousands of virtual exam sims that are very accurate.

I'm pretty sure it's Kerberos, since it's a windows network and you want to be able to monitor the traffic (port 88). http://en.wikipedia.org/wiki/Kerberos_(protocol)

-Friday
0
 
LVL 39

Assisted Solution

by:Krzysztof Pytko
Krzysztof Pytko earned 250 total points
ID: 34958464
Yes, IPSEC (A answer) is correct. To monitor traffic Microsoft Network Monitor can be used.
IPSec allows for
Authentication Header (AH) which tells that packet sent from client wasn't tampered but data is not encrypted
Encapsulating Security Payload (ESP) tells the same but additionally encrypts data, so it cannot be intercepted (because of unreadable content)

Regards,
Krzysztof
0
 
LVL 2

Author Closing Comment

by:kunalclk
ID: 34963651
Thanks a lot, also shall use friday.
0

Featured Post

Free Tool: Site Down Detector

Helpful to verify reports of your own downtime, or to double check a downed website you are trying to access.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Active Directory security has been a hot topic of late, and for good reason. With 90% of the world’s organization using this system to manage access to all parts of their IT infrastructure, knowing how to protect against threats and keep vulnerabil…
Here's a look at newsworthy articles and community happenings during the last month.
This tutorial will walk an individual through the process of configuring their Windows Server 2012 domain controller to synchronize its time with a trusted, external resource. Use Google, Bing, or other preferred search engine to locate trusted NTP …
Are you ready to implement Active Directory best practices without reading 300+ pages? You're in luck. In this webinar hosted by Skyport Systems, you gain insight into Microsoft's latest comprehensive guide, with tips on the best and easiest way…
Suggested Courses

628 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question