List three recommendations to help secure a wireless network.
What will be an ideal response?
Here are a number of recommendations to help secure your wireless network:
· Mandate the use of WPA2 and strong passkeys to encrypt wireless communications and to provide a basic layer of authentication.
· Employ wireless IDS to help spot rogue access points, evil twins, wardriving, and other probes of the network.
· Use mutual authentication methods - like EAP-TLS - in order to provide a level of trust by authenticating not only the client to server but also the server to the client.
· For an added security layer, ensure that wireless connections authenticate via a VPN prior to gaining access to the wired network resources.
You might also like to view...
Discuss the bounds of network capacity formed by rewiring and new link addition in the context of small-world networks.
What will be an ideal response?
________ is the term used to describe the process of using your computer to view webpages
A) Browsing B) Pharming C) Phishing D) Surfing
What tag can be used to apply formatting inline, within another element?
What will be an ideal response?
Which software development model is a linear and sequential model?
A. spiral model B. agile model C. waterfall model D. hybrid model