RADIUS federation should be implemented because it involves using RADIUS servers to authenticate users across multiple organizations. This allows users to log in once and access the network resources of other organizations seamlessly. Given that all the organizations use the native 802.1x client on their mobile devices, RADIUS federation is the most suitable choice, as 802.1x is an IEEE Standard for port-based Network Access Control (PNAC) that provides an authentication mechanism to devices wishing to attach to a LAN or WLAN.
Implementing vendor diversity improves the resiliency of a security system. It achieves this by deploying security controls from different vendors, thereby avoiding a single point of failure. This layered approach makes it harder for an attack to compromise the system as a whole, enhancing its ability to withstand and recover from threats.
The characteristic that best describes the ability to handle variable capacity demand cost-effectively is elasticity. Elasticity refers to the ability of a system to automatically provision and de-provision resources to match the current workload as closely as possible. This means the system can scale up during spikes in compute utilization and scale down when the demand is low, thus optimizing costs.
The PEM format is used to encode certificates in Base64 ASCII format, which is required for the system import described in the question. PEM stands for Privacy Enhanced Mail and is commonly used for X.509 certificates. It can contain both binary and ASCII encoded data, and it is often wrapped with 'BEGIN CERTIFICATE' and 'END CERTIFICATE' lines, making it suitable for import processes that require Base64 encoding.
A Distributed Denial of Service (DDoS) attack aims to overwhelm a network, service, or server with traffic, rendering it unavailable to legitimate users. This significantly impacts data availability, as users cannot access the data or services provided by the targeted system while the attack is ongoing.