List five guidelines for wireless security.

What will be an ideal response?


1. Turn on the wireless security features.
2. Use firewalls and intrusion detection on the LAN.
3. Improve authentication of the WLAN by incorporating 802.1x security features.
4. Consider using third-party encryption to protect wireless data.
5. Whenever possible, use encrypted services such as SSH and Secure FTP.

Computer Science & Information Technology

You might also like to view...

Which of the following is NOT a step in the CPU machine cycle?

A) Fetch B) Execute C) Decode D) Register

Computer Science & Information Technology

To centralize resources, businesses most likely will use a(n) ________ network

Fill in the blank(s) with correct word

Computer Science & Information Technology

Given a graphic that will appear on the Web site, you want to add shading to its interior to give it the appearance of silky fabric. Which effect in the Layer Style dialog box can you use?

a. Satin b. Interior Shading c. Fabric d. Color Overlay

Computer Science & Information Technology

Does Amazon Route 53 support NS Records?

A. Yes, it supports Name Service records. B. No C. It supports only MX records. D. Yes, it supports Name Server records.

Computer Science & Information Technology