Now that you have a fully functioning CA hierarchy in each location, and that the trusted network is
well underway, you are called in to meet with Blue. Blue comes into the room, and you talk to one
another for a while. It seems that now with the CA hierarchy in place, you need to plan the certificate
rollout for the individual users and computers in the network. Since this is the executive building,
Blue places higher security requirements here than on the otherbuildings. Certificates need to be
issued to all the entities, computers and users, in the network.Blue has decided that for all senior
level management, the process for certificate issuance should be even more secure than the rest of
the deployment. Based on this information, and you understanding of the GlobalCorp environment,
choose the best solution to assigning certificates to the computers and users of the trusted network
in the Executive building:}
Question No 2
You have now seen to it that all end users and computers in the Testbed office have received their
certificates. The administrative staff has been trained on their use and function in the network. The
following day, you meet with Blue to discuss the progress."So far so good," starts Blue, "all the users
have their certificates, all the computers havetheir certificates. I think we are moving forward at a
solid pace. We have talked about the ways we will use our certificates, and we need to move towards
securing our network traffic." "I agree," you reply, "last week I ran a scheduled scan, and we stillhave
vulnerability in our network traffic. The folks from MassiveCorp would love to have a sniffer running
in here, I sure of that." "That's exactly the point. We need a system in place that will ensure that our
network traffic is not so vulnerable to sniffing. We have"to get some protection for our packets. I'd
like you to design the system and then we can review it together." The meeting ends a few minutes
later, and you are back in your office working on the design. Choose the best solution for protecting
the network traffic in the executive office of the Testbed campus:}
Question No 3
You had been taking a short vacation, and when you come into work on Monday morning, Blue is
already at your door, waiting to talk to you. "We're got a problem," Blue says, "It seems that the
password used by our Vice President of Engineering has been compromised." Over the weekend, we
found this account had logged into the network 25 times. The Vice President was not even in the
office over the weekend." "Did we get thes ource of the compromise yet?" "No, but it won't surprise
me if it is our new neighbors at MassiveCorp. I need to you to come up with a realistic plan and bring
it to me tomorrow afternoon. This problem must be resolved, and like everything else we do not
have unlimited funds so keep that inmind." Based on this information, choose the best solution to
the password local authentication problem in the Executive building.}