Exam SY0-601 All QuestionsBrowse all questions from this exam
Question 26

A security engineer is deploying a new wireless network for a company. The company shares office space with multiple tenants. Which of the following should the engineer configure on the wireless network to ensure that confidential data is not exposed to unauthorized users?

    Correct Answer: A

    To ensure that confidential data is not exposed to unauthorized users in a wireless network shared with multiple tenants, the security engineer should configure EAP (Extensible Authentication Protocol). EAP provides a framework for secure authentication methods, such as digital certificates or other mechanisms, which helps to verify the identity of users before granting network access, thus preventing unauthorized access. While AES is important for encrypting data, EAP directly addresses the essential need for authentication and access control in this scenario.

Discussion
GravocOption: D

EAP has to be incorrect. EAP is an AUTHENTICATION protocol, and authentication does not provide confidentiality. Authentication encompasses processes that allows systems and networks to determine if a user is who they say they are. That provides integrity, not confidentiality. Confidentiality ensures that secret information is protected from UNAUTHORIZED disclosure. The question also ends with "unauthorized users". HTTPS is just HTTP that uses TLS to encrypt network traffic that is in-transit. A stated above, TLS encrypts in-transit data. This question specifically states preventing exposed data to unauthorized users. TLS and HTTPS only encrypt in-transit data. Data-at-rest in a network is insecure, though. Only AES meets the criteria of providing confidentiality to both data-at-rest and data-in-transit, preventing unauthorized users from seeing either.

adodoccletus

You did a very good job with the explanation... kudos

hieptran

AES is not commonly used for data encryption in transit. Also, the question mentioned, "prevent unauthorized access". AES is only cryptographic and does not provide any authorization to the network... just keep it simple

klinkklonk

Wrong. AES is commonly used for data in transit and WI-FI networks as part of the WPA2 and WPA3 protocols.

CTE_Instructor

The question prompt is to provide confidentiality from unauthorized users - the question is asking to configure authentication. The truest answer is configuring EAP-TLS, but unfortunately CompTIA split them into to separate options. I would select EAP among these options because that is an authentication protocol, and further specify in the actual real-world configuration page to use EAP-TLS, which is authentication using TLS encryption.

CTE_Instructor

I suppose when considering EAP with no encryption like TLS added, it would not solve the problem of confidentiality, in which case AES would provide security to the wireless network. It's a bit of a misleading question in all honesty.

Clau95

Given the need to ensure confidential data is not exposed to unauthorized users, the most comprehensive answer is: A. EAP Configuring a secure EAP method, such as EAP-TLS, ensures strong authentication, while combining it with WPA2 or WPA3 that uses AES for encryption will provide robust security for the wireless network. Therefore, while EAP is the best answer from the given options, ensuring the use of AES for encryption is also critical for overall security

Ay_maOption: A

EAP- Extensible Authentication Protocol (EAP), an authentication framework that provides general guidance for authentication methods. IEEE 802.1x servers typically use one of these methods to increase the level of security during the authentication process TLS- Secure Sockets Layer (SSL) and Transport Layer Security (TLS) are encryption protocols that have been commonly used to encrypt data-in- transit. For example, it is common to encrypt HTTPS with either SSL or TLS to ensure confidentiality of data transmitted over the Internet. They can also be used to encrypt other transmissions such as File Transfer Protocol Secure (FTPS). However, TLS is now a replacement for SSL as SSL is deprecated and shouldn't be used. AES- Advanced Encryption Standard. A strong symmetric block cipher that encrypts data in 128-bit blocks. AES can use key sizes of 128 bits, 192 bits, or 256 bits. HTTPS- Hypertext Transfer Protocol Secure. A protocol used to encrypt HTTP traffic. HTTPS encrypts traffic with TLS using TCP port 443. Definitions are from Gibson Darril's Study. Guide

klinkklonkOption: D

AES Have verified this with cybersecurity professionals. The keyword is encryption. Other companies will still authenticate onto the same network with EPA, AES adds another layer of protection for data on this same network.

klinkklonk

I have verified this with cybersecurity professionals. The answer is AES. EAP by itself doesn't protect data. Remember there are multiple companies using the same wireless network. EAP would authenticate all the companies onto the same network, but doesn't protect data.

NE84jgFYOption: D

WPA2 and WPA3 use AES for encrypting the wireless communications. EAP is just an authentication protocol.

thea_smithOption: A

A is correct. If you want full version with correct answers, contact me at <a href="/cdn-cgi/l/email-protection" class="__cf_email__" data-cfemail="8cf8e4e9eda2ffe1e5f8e4bebccce3f9f8e0e3e3e7a2efe3e1">[email protected]</a>

thea_smithOption: D

D in my opionion is correct. Contact to get all questions <a href="/cdn-cgi/l/email-protection" class="__cf_email__" data-cfemail="a3d7cbc6c28dd0cecad7cb9193e3ccd6d7cfccccc88dc0ccce">[email protected]</a>

AspiringNerdOption: A

A. EAP (Extensible Authentication Protocol) EAP provides a framework for authenticating users onto a network, allowing for secure authentication methods such as username/password, digital certificates, or other mechanisms. By implementing EAP, the network can verify the identity of users before granting access, thus helping to prevent unauthorized access to confidential data. While TLS (Transport Layer Security), HTTPS (Hypertext Transfer Protocol Secure), and AES (Advanced Encryption Standard) are important for securing data in transit and encrypting communications, they do not directly address authentication and access control, which are crucial for preventing unauthorized access to the network and confidential data. Therefore, while these technologies may be part of an overall security strategy, EAP specifically addresses the authentication aspect needed in this scenario.

AnonymousJhbOption: A

are you sure? the essence of "unauthorized users" is based on authorization. EAS does not do authorization. Authorization is the primary function of EAP = making sure only the authorization users receive their data.

agfencerOption: A

EAP is a framework that supports multiple authentication methods, such as EAP-TLS, PEAP, and EAP-TTLS, which can provide strong security for wireless networks. Using EAP, especially with a secure method like EAP-TLS, ensures that only authorized users can connect to the network and that data transmitted over the wireless network is encrypted and protected.

examdj101jOption: A

The common answer is AES against other Test Frameworks that I have been a part of in regards to security of WIFI networks.

Dragoox

Wireless network is the keyword here

Amxn099Option: A

Extensible Authentication Protocol (EAP) is used to pass the authentication information between the supplicant (the Wi-Fi workstation) and the authentication server (Microsoft IAS or other). The Advanced Encryption Standard (AES) is an algorithm that uses the same key to encrypt and decrypt protected data. Instead of a single round of encryption, data is put through several rounds of substitution, transposition, and mixing to make it harder to compromise.

DennisEAOption: D

WPA2 and WPA3 are built on AES. Answer is D

JustJessOption: A

I've checked multiple sources an EAP is the answer. It provided secure authentication. Also, this is an office building that is not described as being on the level of NASA or any government agency.

dfc6822Option: A

To ensure that confidential data is not exposed to unauthorized users in a wireless network shared with multiple tenants, the security engineer should configure: A. EAP (Extensible Authentication Protocol)

smooth77Option: A

A. EAP is the correct answer To ensure that confidential data is not exposed to unauthorized users, the security engineer should configure EAP (Extensible Authentication Protocol) on the wireless network. EAP is a wireless authentication framework that is commonly utilized in wireless networks.

smooth77Option: A

A. EAP is the correct Answer. To ensure that confidential data is not exposed to unauthorized users, the security engineer should configure EAP (Extensible Authentication Protocol) on the wireless network. EAP is a wireless authentication framework that is commonly utilized in wireless networks.