In highly secure environments where the risk of malicious actors attempting to steal data is high, which of the following is the BEST reason to deploy Faraday cages?
A.
To provide emanation control to prevent credential harvesting
B.
To minimize signal attenuation over distances to maximize signal strength
C.
To minimize external RF interference with embedded processors
D.
To protect the integrity of audit logs from malicious alteration
Apparently not enough, since the suggested answer seems to be wrong.
From Gibson's guide:
"A Faraday cage is typically a room that prevents signals FROM EMANATING beyond the room."
It isolates the signals coming from inside, preventing them to go outside the room and of course at the same time prevents signals from outside to enter inside the room.
So there are various possible security benefits provided by a Faraday cage and the one described in the answer C is surely among them; but the question specifies we are in an environment in which "the risk of malicious actors attempting to steal data is high"; the concern here is to prevent internal signals to be catched outside; in this case the main reason for the deployment of a Faraday cage is "to provide emanation control to prevent credential harvesting" (answer A).
I dont see how minimizing external RF interference with embedded processors help prevent stealing of data as opposed to preventing credential harvesting
C is a valid explanation to what faraday cages can be used for, but the question is asking for the BEST reason in that scenario and I believe A prevent credential harvesting is correct here
In the exam do not select A or B or C or D . Just click on "Faraday cages?" word that in the end of the question and you will be good to go. Comptia will give you the cert and refund of what you paid or maybe they will send you to vacation to Hawaii. They like their Faraday cages!!!!
Credential harvesting is man in the middle attack I never heard Fridaycage is used for that instead it protect data from radio frequency leak so c is z answer
Credential Harvesting (or Account Harvesting) is the use of MITM attacks, DNS poisoning, phishing, and other vectors to amass large numbers of credentials (username / password combinations) for reuse.
what if the said room broadcasts wifi signals where a man in the middle attack is likely if these signals get outside. Dont you think the faraday cage is essential in this scenario? think beyond the scope and you will see the importance of answer A
If I go by the option C, then I must place my IoT (has embedded microprocessor)enabled refrigerator in a Faraday cage. Option A is the correct answer in my opinion.
"A Faraday cage operates because an external electrical field causes the electric charges within the cage's conducting material to be distributed so that they cancel the field's effect in the cage's interior. This phenomenon is used to protect sensitive electronic equipment (for example RF receivers) from external radio frequency interference (RFI) often during testing or alignment of the device. They are also used to protect people and equipment against actual electric currents such as lightning strikes and electrostatic discharges, since the enclosing cage conducts current around the outside of the enclosed space and none passes through the interior." https://en.wikipedia.org/wiki/Faraday_cage
At these frequencies, each signal line which carries such high frequency components can act as
an antenna, and possibly emanate secrets which can then be measured using
antennas or near-field probes. This can be wires connected to the processor, or
even signal lines inside the processor [5].
A Faraday cage is a wire mesh container that can completely encase an
entire room or be the size of a bag. The mesh is designed in such a way
that it blocks external electromagnetic fields from entering into the
container. For physical security, Faraday cages are often used to protect
electronic devices from interference from external wireless signals. For
example, they may be used to preserve the integrity of a mobile device
collected as forensic evidence so that the device will not receive any
outside transmissions.
D is correct answer.
What does minimizing external RF interference have to do with protecting data?
upvoted 3 times
...
...
...
This section is not available anymore. Please use the main Exam Page.SY0-501 Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Aerials
Highly Voted 4 years, 9 months agojas26says
4 years, 7 months agoDuranio
4 years, 9 months agofonka
3 years, 9 months agosteven1
4 years, 8 months agoTeza
4 years, 7 months agoexiledwl
4 years, 3 months agohlwo
Highly Voted 4 years, 6 months agofonka
Most Recent 3 years, 9 months agoekinzaghi
3 years, 9 months agouyyutgy
3 years, 9 months agoskuppper_12
3 years, 11 months agoGraycloak
3 years, 11 months agoLokiSecure
3 years, 11 months agoAntonioTech
3 years, 12 months agoallmycircuit5
4 years, 3 months agoHerbie1995
4 years, 4 months agociki
4 years, 6 months agobabati
4 years, 8 months agobabati
4 years, 8 months agoanhnguyen
4 years, 8 months agoRamsey2020
4 years, 8 months agoHanzero
4 years, 7 months agoDubbsnix
3 years, 12 months agoHeymannicerouter
3 years, 11 months ago