Question no 44:
This wireless security protocol allows 192-bit minimum-strength security protocols and
cryptographic tools to protect sensitive data, such as GCMP-256, HMAC-SHA384, and
ECDSA using a 384-bit elliptic curve.
Which is this wireless security protocol?
WPA2-Enterprise
WPA3-Personal
WPA3-Enterprise
WPA2-Personal
Question no 45:
Bella, a security professional working at an IT firm, finds that a security breach has occurred
while transferring important files. Sensitive data, employee usernames, and passwords are
shared in plaintext, paving the way for hackers to perform successful session hijacking. To
address this situation, Bella implemented a protocol that sends data using encryption and
digital certificates.
Which of the following protocols is used by Bella?
FTP
IP
HTTPS
FTPS
Question no 46:
George is a security professional working for iTech Solutions. He was tasked with securely
transferring sensitive data of the organization between industrial systems. In this process,
he used a short-range communication protocol based on the IEEE 203.15.4 standard. This
protocol is used in devices that transfer data infrequently at a low rate in a restricted area,
within a range of 10–100 m.
What is the short-range wireless communication technology George employed in the above
scenario?
LPWAN