Solved

ENCRYPTION POLICES

Posted on 2011-02-22
3
379 Views
Last Modified: 2012-05-11
The users in the accounting department use their client computers to access
confidential files over the network. The files must not be altered by unauthorized
users as the files traverse the network.
You need to secure the data transmissions to and from client computers in the
accounting department. You also need to be able to monitor the traffic on the
network and report to IT management the percentage of bandwidth used for each
protocol. Your action to be?
A. Use IPSec encryption
B. Use Server Message Block (SMB) signing
C. Use NTLMv2 authentication
D. Use the Kerberos version 5 authentication protocol

/////////////////////

IPSEC is the most secure one and I agree with it.
0
Comment
Question by:kunalclk
3 Comments
 
LVL 3

Accepted Solution

by:
Freaky_Friday earned 250 total points
ID: 34957174
Hello Kunalclk,

That question looks like it's from an exam. I recently had very good luck with the free test simulators on www.examcollection.com. They have literally thousands of virtual exam sims that are very accurate.

I'm pretty sure it's Kerberos, since it's a windows network and you want to be able to monitor the traffic (port 88). http://en.wikipedia.org/wiki/Kerberos_(protocol)

-Friday
0
 
LVL 39

Assisted Solution

by:Krzysztof Pytko
Krzysztof Pytko earned 250 total points
ID: 34958464
Yes, IPSEC (A answer) is correct. To monitor traffic Microsoft Network Monitor can be used.
IPSec allows for
Authentication Header (AH) which tells that packet sent from client wasn't tampered but data is not encrypted
Encapsulating Security Payload (ESP) tells the same but additionally encrypts data, so it cannot be intercepted (because of unreadable content)

Regards,
Krzysztof
0
 
LVL 2

Author Closing Comment

by:kunalclk
ID: 34963651
Thanks a lot, also shall use friday.
0

Featured Post

Optimizing Cloud Backup for Low Bandwidth

With cloud storage prices going down a growing number of SMBs start to use it for backup storage. Unfortunately, business data volume rarely fits the average Internet speed. This article provides an overview of main Internet speed challenges and reveals backup best practices.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Is your Office 365 signature not working the way you want it to? Are signature updates taking up too much of your time? Let's run through the most common problems that an IT administrator can encounter when dealing with Office 365 email signatures.
This article runs through the process of deploying a single EXE application selectively to a group of user.
This tutorial will show how to push an installation of Backup Exec to an additional server in both 2012 and 2014 versions of the software. Click on the Backup Exec button in the upper left corner. From here, select Installation and Licensing, then I…
This tutorial will show how to configure a single USB drive with a separate folder for each day of the week. This will allow each of the backups to be kept separate preventing the previous day’s backup from being overwritten. The USB drive must be s…

821 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question