A security manager is concerned about the security of its WEP-encrypted WiFi network. How can security be improved to prevent eavesdroppers from viewing sensitive business information?

a. Require VPN for all users using the WiFi network
b. Require SSL VPN for all users using the WiFi network
c. Upgrade authentication to EAP
d. Upgrade authentication to PEAP


a. Require VPN for all users using the WiFi network

Computer Science & Information Technology

You might also like to view...

A table

A) is an individual piece of data, such as a last name. B) is a complete set of data for an entity. C) represents a Field which is an individual piece of data. D) is an area in the worksheet that contains rows and columns of related data formatted to enable data management and analysis.

Computer Science & Information Technology

A module consists of ________, which are units of computer code that perform some type of action

A) procedures B) activities C) controls D) macros

Computer Science & Information Technology

List the rules for organizing data in a data range that can be sorted and filtered.

What will be an ideal response?

Computer Science & Information Technology

This standard is part of Carnegie Mellon University, defines standards with government organizations, businesses, and academia to improve the software development process.

A. CMMI B. IEEE 12207 C. NIST D. ISO

Computer Science & Information Technology