Ann a new security specialist is attempting to access the internet using the company's open wireless network. The wireless network is not encrypted: however, once associated, ANN cannot access the internet or other company resources. In an attempt to troubleshoot, she scans the wireless network with NMAP, discovering the only other device on the wireless network is a firewall. Which of the following BEST describes the company's wireless network solution?
A. The company uses VPN to authenticate and encrypt wireless connections and traffic
B. The company's wireless access point is being spoofed
C. The company's wireless network is unprotected and should be configured with WPA2
D. The company is only using wireless for internet traffic so it does not need additional encryption
Answer: A. The company uses VPN to authenticate and encrypt wireless connections and traffic
You might also like to view...
Before applying the Excel Subtotal tool, the rows need to be ________ by the column being subtotaled
A) combined B) filtered C) sorted D) delimited
The ________ function is used to count the number of cells in a range that are not blank
A) COUNTIF B) COUNT C) COUNTA D) COUNTIFS
When using CHAP which of the following is the first step in the process?
A. The remote node responds with a value calculated using an MD5 hash salted with the password B. The local router sends a challenge message to the remote router C. The local router verifies the hash value D. The local router sends its password
The analysis tools associated with the data manipulation subsystem that support querying databases include ________ and structured query languages (SQL).
A. data redundancy B. data definition C. query-by-example D. attribute analysis