A security manager is concerned about the security of its WEP-encrypted WiFi network. How can security be improved to prevent eavesdroppers from viewing sensitive business information?
a. Require VPN for all users using the WiFi network
b. Require SSL VPN for all users using the WiFi network
c. Upgrade authentication to EAP
d. Upgrade authentication to PEAP
a. Require VPN for all users using the WiFi network
You might also like to view...
A table
A) is an individual piece of data, such as a last name. B) is a complete set of data for an entity. C) represents a Field which is an individual piece of data. D) is an area in the worksheet that contains rows and columns of related data formatted to enable data management and analysis.
A module consists of ________, which are units of computer code that perform some type of action
A) procedures B) activities C) controls D) macros
List the rules for organizing data in a data range that can be sorted and filtered.
What will be an ideal response?
This standard is part of Carnegie Mellon University, defines standards with government organizations, businesses, and academia to improve the software development process.
A. CMMI B. IEEE 12207 C. NIST D. ISO