Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.

Unlimited Access

Get Unlimited Contributor Access to the all ExamTopics Exams!
Take advantage of PDF Files for 1000+ Exams along with community discussions and pass IT Certification Exams Easily.

Exam SY0-601 topic 1 question 26 discussion

Actual exam question from CompTIA's SY0-601
Question #: 26
Topic #: 1
[All SY0-601 Questions]

A security engineer is deploying a new wireless network for a company. The company shares office space with multiple tenants. Which of the following should the engineer configure on the wireless network to ensure that confidential data is not exposed to unauthorized users?

  • A. EAP
  • B. TLS
  • C. HTTPS
  • D. AES
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
Gravoc
Highly Voted 1 year, 7 months ago
EAP has to be incorrect. EAP is an AUTHENTICATION protocol, and authentication does not provide confidentiality. Authentication encompasses processes that allows systems and networks to determine if a user is who they say they are. That provides integrity, not confidentiality. Confidentiality ensures that secret information is protected from UNAUTHORIZED disclosure. The question also ends with "unauthorized users". HTTPS is just HTTP that uses TLS to encrypt network traffic that is in-transit. A stated above, TLS encrypts in-transit data. This question specifically states preventing exposed data to unauthorized users. TLS and HTTPS only encrypt in-transit data. Data-at-rest in a network is insecure, though. Only AES meets the criteria of providing confidentiality to both data-at-rest and data-in-transit, preventing unauthorized users from seeing either.
upvoted 117 times
CTE_Instructor
1 year, 2 months ago
The question prompt is to provide confidentiality from unauthorized users - the question is asking to configure authentication. The truest answer is configuring EAP-TLS, but unfortunately CompTIA split them into to separate options. I would select EAP among these options because that is an authentication protocol, and further specify in the actual real-world configuration page to use EAP-TLS, which is authentication using TLS encryption.
upvoted 2 times
CTE_Instructor
1 year, 2 months ago
I suppose when considering EAP with no encryption like TLS added, it would not solve the problem of confidentiality, in which case AES would provide security to the wireless network. It's a bit of a misleading question in all honesty.
upvoted 3 times
...
...
adodoccletus
1 year, 6 months ago
You did a very good job with the explanation... kudos
upvoted 2 times
...
hieptran
1 year, 3 months ago
AES is not commonly used for data encryption in transit. Also, the question mentioned, "prevent unauthorized access". AES is only cryptographic and does not provide any authorization to the network... just keep it simple
upvoted 12 times
klinkklonk
3 months, 1 week ago
Wrong. AES is commonly used for data in transit and WI-FI networks as part of the WPA2 and WPA3 protocols.
upvoted 4 times
...
...
MikeM3
1 year ago
AES (Advanced Encryption Protocol) is a widely used encryption standard that provides strong encryption for dat at rest or in transit it is considered one of the most secure encryptions algorithms available
upvoted 4 times
...
...
Ay_ma
Highly Voted 1 year, 8 months ago
EAP- Extensible Authentication Protocol (EAP), an authentication framework that provides general guidance for authentication methods. IEEE 802.1x servers typically use one of these methods to increase the level of security during the authentication process TLS- Secure Sockets Layer (SSL) and Transport Layer Security (TLS) are encryption protocols that have been commonly used to encrypt data-in- transit. For example, it is common to encrypt HTTPS with either SSL or TLS to ensure confidentiality of data transmitted over the Internet. They can also be used to encrypt other transmissions such as File Transfer Protocol Secure (FTPS). However, TLS is now a replacement for SSL as SSL is deprecated and shouldn't be used. AES- Advanced Encryption Standard. A strong symmetric block cipher that encrypts data in 128-bit blocks. AES can use key sizes of 128 bits, 192 bits, or 256 bits. HTTPS- Hypertext Transfer Protocol Secure. A protocol used to encrypt HTTP traffic. HTTPS encrypts traffic with TLS using TCP port 443. Definitions are from Gibson Darril's Study. Guide
upvoted 30 times
...
DennisEA
Most Recent 15 hours, 31 minutes ago
WPA2 and WPA3 are built on AES. Answer is D
upvoted 1 times
...
thea_smith
1 week, 2 days ago
Selected Answer: D
D in my opionion is correct. Contact to get all questions [email protected]
upvoted 1 times
...
AspiringNerd
2 weeks, 2 days ago
Selected Answer: A
A. EAP (Extensible Authentication Protocol) EAP provides a framework for authenticating users onto a network, allowing for secure authentication methods such as username/password, digital certificates, or other mechanisms. By implementing EAP, the network can verify the identity of users before granting access, thus helping to prevent unauthorized access to confidential data. While TLS (Transport Layer Security), HTTPS (Hypertext Transfer Protocol Secure), and AES (Advanced Encryption Standard) are important for securing data in transit and encrypting communications, they do not directly address authentication and access control, which are crucial for preventing unauthorized access to the network and confidential data. Therefore, while these technologies may be part of an overall security strategy, EAP specifically addresses the authentication aspect needed in this scenario.
upvoted 2 times
...
AnonymousJhb
1 month, 3 weeks ago
are you sure? the essence of "unauthorized users" is based on authorization. EAS does not do authorization. Authorization is the primary function of EAP = making sure only the authorization users receive their data.
upvoted 2 times
...
JustJess
1 month, 3 weeks ago
I've checked multiple sources an EAP is the answer. It provided secure authentication. Also, this is an office building that is not described as being on the level of NASA or any government agency.
upvoted 1 times
...
dfc6822
3 months, 1 week ago
To ensure that confidential data is not exposed to unauthorized users in a wireless network shared with multiple tenants, the security engineer should configure: A. EAP (Extensible Authentication Protocol)
upvoted 1 times
...
klinkklonk
3 months, 1 week ago
Selected Answer: D
AES Have verified this with cybersecurity professionals. The keyword is encryption. Other companies will still authenticate onto the same network with EPA, AES adds another layer of protection for data on this same network.
upvoted 4 times
klinkklonk
3 months, 1 week ago
I have verified this with cybersecurity professionals. The answer is AES. EAP by itself doesn't protect data. Remember there are multiple companies using the same wireless network. EAP would authenticate all the companies onto the same network, but doesn't protect data.
upvoted 2 times
...
...
NE84jgFY
3 months, 2 weeks ago
Selected Answer: D
WPA2 and WPA3 use AES for encrypting the wireless communications. EAP is just an authentication protocol.
upvoted 5 times
...
smooth77
3 months, 3 weeks ago
A. EAP is the correct answer To ensure that confidential data is not exposed to unauthorized users, the security engineer should configure EAP (Extensible Authentication Protocol) on the wireless network. EAP is a wireless authentication framework that is commonly utilized in wireless networks.
upvoted 1 times
...
smooth77
3 months, 3 weeks ago
A. EAP is the correct Answer. To ensure that confidential data is not exposed to unauthorized users, the security engineer should configure EAP (Extensible Authentication Protocol) on the wireless network. EAP is a wireless authentication framework that is commonly utilized in wireless networks.
upvoted 1 times
...
thea_smith
3 months, 3 weeks ago
Selected Answer: A
A is correct. If you want full version with correct answers, contact me at [email protected]
upvoted 3 times
...
ImpactTek
3 months, 3 weeks ago
To ensure that confidential data is not exposed to unauthorized users on a wireless network in a shared office space, the security engineer should configure: A. EAP (Extensible Authentication Protocol) EAP is commonly used in wireless networks to provide secure authentication. It is often used in conjunction with other protocols, such as EAP-TLS (EAP-Transport Layer Security) or EAP-PEAP (Protected EAP), to ensure that only authorized users can access the network. While the other options (B. TLS, C. HTTPS, and D. AES) are also important for security, they are not specifically related to wireless network authentication
upvoted 1 times
...
maggie22
4 months ago
Selected Answer: D
AES - Advanced Encryption Standard short formed as AES falls under the symmetric encryption category. Thus, in AES the sender and the recipient of the data uses the same key to encrypt and decrypt the data. AES is a FIPS-approved symmetric algorithm that can be used for protecting the data and maintaining confidentiality and integrity of the data.
upvoted 3 times
...
8c55165
4 months ago
It has to be AES. This isn't about authentication, it's about exposure. What prevents exposure of confidential data? Encryption. What encrypts data? AES.
upvoted 2 times
...
Makamaka
4 months ago
Selected Answer: A
Authentication is the key word in question, therefore A.
upvoted 1 times
aspiritualbeing
4 months ago
I believe you need to re-read the question,mate!
upvoted 2 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...