exam questions

Exam SY0-601 All Questions

View all questions & answers for the SY0-601 exam

Exam SY0-601 topic 1 question 26 discussion

Actual exam question from CompTIA's SY0-601
Question #: 26
Topic #: 1
[All SY0-601 Questions]

A security engineer is deploying a new wireless network for a company. The company shares office space with multiple tenants. Which of the following should the engineer configure on the wireless network to ensure that confidential data is not exposed to unauthorized users?

  • A. EAP
  • B. TLS
  • C. HTTPS
  • D. AES
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Gravoc
Highly Voted 2 years, 7 months ago
EAP has to be incorrect. EAP is an AUTHENTICATION protocol, and authentication does not provide confidentiality. Authentication encompasses processes that allows systems and networks to determine if a user is who they say they are. That provides integrity, not confidentiality. Confidentiality ensures that secret information is protected from UNAUTHORIZED disclosure. The question also ends with "unauthorized users". HTTPS is just HTTP that uses TLS to encrypt network traffic that is in-transit. A stated above, TLS encrypts in-transit data. This question specifically states preventing exposed data to unauthorized users. TLS and HTTPS only encrypt in-transit data. Data-at-rest in a network is insecure, though. Only AES meets the criteria of providing confidentiality to both data-at-rest and data-in-transit, preventing unauthorized users from seeing either.
upvoted 123 times
CTE_Instructor
2 years, 2 months ago
The question prompt is to provide confidentiality from unauthorized users - the question is asking to configure authentication. The truest answer is configuring EAP-TLS, but unfortunately CompTIA split them into to separate options. I would select EAP among these options because that is an authentication protocol, and further specify in the actual real-world configuration page to use EAP-TLS, which is authentication using TLS encryption.
upvoted 4 times
CTE_Instructor
2 years, 2 months ago
I suppose when considering EAP with no encryption like TLS added, it would not solve the problem of confidentiality, in which case AES would provide security to the wireless network. It's a bit of a misleading question in all honesty.
upvoted 5 times
...
...
Clau95
10 months, 1 week ago
Given the need to ensure confidential data is not exposed to unauthorized users, the most comprehensive answer is: A. EAP Configuring a secure EAP method, such as EAP-TLS, ensures strong authentication, while combining it with WPA2 or WPA3 that uses AES for encryption will provide robust security for the wireless network. Therefore, while EAP is the best answer from the given options, ensuring the use of AES for encryption is also critical for overall security
upvoted 3 times
...
adodoccletus
2 years, 6 months ago
You did a very good job with the explanation... kudos
upvoted 2 times
...
hieptran
2 years, 3 months ago
AES is not commonly used for data encryption in transit. Also, the question mentioned, "prevent unauthorized access". AES is only cryptographic and does not provide any authorization to the network... just keep it simple
upvoted 13 times
klinkklonk
1 year, 3 months ago
Wrong. AES is commonly used for data in transit and WI-FI networks as part of the WPA2 and WPA3 protocols.
upvoted 4 times
...
...
...
Ay_ma
Highly Voted 2 years, 8 months ago
EAP- Extensible Authentication Protocol (EAP), an authentication framework that provides general guidance for authentication methods. IEEE 802.1x servers typically use one of these methods to increase the level of security during the authentication process TLS- Secure Sockets Layer (SSL) and Transport Layer Security (TLS) are encryption protocols that have been commonly used to encrypt data-in- transit. For example, it is common to encrypt HTTPS with either SSL or TLS to ensure confidentiality of data transmitted over the Internet. They can also be used to encrypt other transmissions such as File Transfer Protocol Secure (FTPS). However, TLS is now a replacement for SSL as SSL is deprecated and shouldn't be used. AES- Advanced Encryption Standard. A strong symmetric block cipher that encrypts data in 128-bit blocks. AES can use key sizes of 128 bits, 192 bits, or 256 bits. HTTPS- Hypertext Transfer Protocol Secure. A protocol used to encrypt HTTP traffic. HTTPS encrypts traffic with TLS using TCP port 443. Definitions are from Gibson Darril's Study. Guide
upvoted 30 times
...
agfencer
Most Recent 10 months ago
Selected Answer: A
EAP is a framework that supports multiple authentication methods, such as EAP-TLS, PEAP, and EAP-TTLS, which can provide strong security for wireless networks. Using EAP, especially with a secure method like EAP-TLS, ensures that only authorized users can connect to the network and that data transmitted over the wireless network is encrypted and protected.
upvoted 2 times
...
examdj101j
11 months, 1 week ago
Selected Answer: A
The common answer is AES against other Test Frameworks that I have been a part of in regards to security of WIFI networks.
upvoted 1 times
...
Dragoox
11 months, 3 weeks ago
Wireless network is the keyword here
upvoted 1 times
...
Amxn099
11 months, 3 weeks ago
Selected Answer: A
Extensible Authentication Protocol (EAP) is used to pass the authentication information between the supplicant (the Wi-Fi workstation) and the authentication server (Microsoft IAS or other). The Advanced Encryption Standard (AES) is an algorithm that uses the same key to encrypt and decrypt protected data. Instead of a single round of encryption, data is put through several rounds of substitution, transposition, and mixing to make it harder to compromise.
upvoted 1 times
...
DennisEA
12 months ago
WPA2 and WPA3 are built on AES. Answer is D
upvoted 1 times
...
AspiringNerd
1 year ago
Selected Answer: A
A. EAP (Extensible Authentication Protocol) EAP provides a framework for authenticating users onto a network, allowing for secure authentication methods such as username/password, digital certificates, or other mechanisms. By implementing EAP, the network can verify the identity of users before granting access, thus helping to prevent unauthorized access to confidential data. While TLS (Transport Layer Security), HTTPS (Hypertext Transfer Protocol Secure), and AES (Advanced Encryption Standard) are important for securing data in transit and encrypting communications, they do not directly address authentication and access control, which are crucial for preventing unauthorized access to the network and confidential data. Therefore, while these technologies may be part of an overall security strategy, EAP specifically addresses the authentication aspect needed in this scenario.
upvoted 3 times
...
AnonymousJhb
1 year, 1 month ago
are you sure? the essence of "unauthorized users" is based on authorization. EAS does not do authorization. Authorization is the primary function of EAP = making sure only the authorization users receive their data.
upvoted 2 times
...
JustJess
1 year, 1 month ago
I've checked multiple sources an EAP is the answer. It provided secure authentication. Also, this is an office building that is not described as being on the level of NASA or any government agency.
upvoted 1 times
...
dfc6822
1 year, 3 months ago
To ensure that confidential data is not exposed to unauthorized users in a wireless network shared with multiple tenants, the security engineer should configure: A. EAP (Extensible Authentication Protocol)
upvoted 1 times
...
klinkklonk
1 year, 3 months ago
Selected Answer: D
AES Have verified this with cybersecurity professionals. The keyword is encryption. Other companies will still authenticate onto the same network with EPA, AES adds another layer of protection for data on this same network.
upvoted 5 times
klinkklonk
1 year, 3 months ago
I have verified this with cybersecurity professionals. The answer is AES. EAP by itself doesn't protect data. Remember there are multiple companies using the same wireless network. EAP would authenticate all the companies onto the same network, but doesn't protect data.
upvoted 2 times
...
...
NE84jgFY
1 year, 3 months ago
Selected Answer: D
WPA2 and WPA3 use AES for encrypting the wireless communications. EAP is just an authentication protocol.
upvoted 5 times
...
smooth77
1 year, 3 months ago
A. EAP is the correct answer To ensure that confidential data is not exposed to unauthorized users, the security engineer should configure EAP (Extensible Authentication Protocol) on the wireless network. EAP is a wireless authentication framework that is commonly utilized in wireless networks.
upvoted 1 times
...
smooth77
1 year, 3 months ago
A. EAP is the correct Answer. To ensure that confidential data is not exposed to unauthorized users, the security engineer should configure EAP (Extensible Authentication Protocol) on the wireless network. EAP is a wireless authentication framework that is commonly utilized in wireless networks.
upvoted 1 times
...
ImpactTek
1 year, 3 months ago
To ensure that confidential data is not exposed to unauthorized users on a wireless network in a shared office space, the security engineer should configure: A. EAP (Extensible Authentication Protocol) EAP is commonly used in wireless networks to provide secure authentication. It is often used in conjunction with other protocols, such as EAP-TLS (EAP-Transport Layer Security) or EAP-PEAP (Protected EAP), to ensure that only authorized users can access the network. While the other options (B. TLS, C. HTTPS, and D. AES) are also important for security, they are not specifically related to wireless network authentication
upvoted 1 times
...
maggie22
1 year, 3 months ago
Selected Answer: D
AES - Advanced Encryption Standard short formed as AES falls under the symmetric encryption category. Thus, in AES the sender and the recipient of the data uses the same key to encrypt and decrypt the data. AES is a FIPS-approved symmetric algorithm that can be used for protecting the data and maintaining confidentiality and integrity of the data.
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago