A company plans a technology rollout. As a precaution, security engineers prepare mitigation plans in the event of an eavesdropping attack. Which connectivity solution is being rolled out?

Get more with Examzify Plus

Remove ads, unlock favorites, save progress, and access premium tools across devices.

FavoritesSave progressAd-free
From $9.99Learn more

Prepare for the WGU ITAS6291 D488 Cybersecurity Architecture and Engineering exam. Use flashcards and multiple-choice questions, each with explanations and guidance. Master your knowledge and excel in your exam!

The correct answer highlights a specific connectivity solution that is particularly susceptible to eavesdropping attacks. Near Field Communication (NFC) is a type of wireless communication that enables devices to exchange data over very short distances, typically just a few centimeters. While NFC is generally considered secure due to its short range, it still presents vulnerabilities, especially if not properly implemented with strong encryption and authentication mechanisms.

Preparing mitigation plans for potential eavesdropping attacks indicates a recognition of the risks associated with wireless communications. Since NFC transactions occur at close range, it is conceivable that an attacker could intercept the data being exchanged if they are within proximity. This makes it crucial for security engineers to anticipate and address potential threats, implementing strategies to enhance security as part of the technology rollout process.

In contrast, Bluetooth, although also vulnerable to eavesdropping, is managed differently compared to NFC. Since Bluetooth can operate over greater distances, the security concerns and mitigation strategies would differ significantly. Peripherals typically refer to hardware devices connected to computers and do not have the same inherent eavesdropping concerns as wireless communication methods. Tethering involves sharing internet connectivity and often relies on direct connections or existing network security, which also differs from the direct eavesdropping concerns with NFC transactions

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy