Recently, your company implemented two wireless networks. Within days of implementation, you discover that unauthorized devices have connected to the wireless networks. You need to ensure that unauthorized devices are unable to connect to either wireless network. What should you do?

A. Deploy the wireless access points behind a firewall.
B. Deploy the wireless access points behind an intrusion prevention system (IPS).
C. Employ MAC filtering on the wireless access points.
D. Disable SSID broadcast on the wireless access points.


C
Explanation: You should employ MAC filtering on the wireless access points. In this situation, it would be best to allow only MAC addresses that you configure in the MAC filter to connect to the wireless networks.
Deploying the wireless access point behind a firewall or IPS would not provide the protection that you need. Currently, devices are able to connect to the wireless access points because the appropriate level of security is not deployed.
Disabling SSID broadcast on the wireless access points will not provide any level of security.

Computer Science & Information Technology

You might also like to view...

Standards encapsulate and then communicate a logical concept and resulting approach to a particular aspect of real world work.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Which of the following is the major issue with a ping scan?

A) It is easy to detect. B) It will not identify open ports. C) Many firewalls block ICMP packets so the scan might not be successful. D) The scan produces many false negatives and false positives.

Computer Science & Information Technology

Match the following Microsoft Office 2013 feature with the tab where it can be found:

I. open Office Backstage II. modify text III. create a new chart in Excel IV. modify an object V. change margins in Word A. contextual tab B. File tab C. Home tab D. Page Layout tab E. Insert tab

Computer Science & Information Technology

COGNITIVE ASSESSMENT You have a new e-book reader and you are expecting to be away on a long hike with it. How many hours of reading can you get from it before needing to recharge it?

A. 75 B. 100 C. 125 D. 150

Computer Science & Information Technology