Question: Please solve All the Questions carefully OR do not answer anything someone else will... Thanks in advance 26- A network administrator is implementing a token

Please solve All the Questions carefully OR do not answer anything someone else will... Thanks in advance

Please solve All the Questions carefully OR do not answer anything someone

26- A network administrator is implementing a token system in which a hardware device is used to store a password. The password is unknown to the user and transmitted to the system for authentication. If implementing to which of the following attacks is this token type vulnerable? A) Replay B) Smurf C) Collision D) Privilege escalation 27- which of the following risk mitigation strategies allows an organization to proactively identify known weaknesses within the organization IT system? A) Incident management B) Vulnerability management C) Identify management D) Change management 28- Which of the following preventive controls has the HIGHEST false rejection rate? A) Proximity readers B) Security token C) Biometrics D) Cipher locks 29- A company has implemented a two-factor authentication system. An automated phishing attack spoofed the portal to capture usernames, passwords, and one-time tokens and replayed the information to the company portal. Which of the following should the company consider implementing to prevent this type of attack? A) Push-based tokens B) Time-based one-time passwords C) HMAC-based one-time passwords D) Single sign-on authentication 30- An administrator uses a packet sniffer and protocol analyzer on a laptop to troubleshoot a secure wireless network connectivity problem. The laptop suddenly loses connection to the wireless network while the administrator captures packets. The last packet captured appears to have come from the AP. Which of the following attacks has taken place? A) TKIP brute force attack B) Deauthentication attack C) IV attack D) Smurf attack

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!