List four issues that a wireless security policy should address.

What will be an ideal response?


Scope and goals of the policy
Responsibilities for wireless matters and contact information for responsible parties
Physical security of APs to prevent tampering, unauthorized access, interference sources, and other problems
Approved hardware and software
Procedures for requesting, testing, installing, and configuring hardware and software
Assignment of responsibilities for installing, maintaining, and managing wireless devices
Guidelines and penalties for scanning or accessing the wireless network without authorization
Explicit statements about the nature of wireless communications, including measures to protect the rest of the network from potential harm from wireless communication
Details on wireless security awareness training
Internet access via wireless connections
Assignment of responsibilities for protecting data, privacy, and devices
Penalties for attempting to bypass security measures willfully

Computer Science & Information Technology

You might also like to view...

Digital images are composed of tiny dots of color known as ____________.

a. halftone cells b. pixels c. light-emitting diodes d. raster elements

Computer Science & Information Technology

Which of the following completes the sentence below correctly? A(n) is a(n) .

a. InputEvent, MouseEvent. b. ActionEvent, AdjustmentEvent. c. FocusEvent, WindowEvent. d. ContainerEvent, ComponentEvent.

Computer Science & Information Technology

What are the criteria for deciding whether a system should be prototyped?

What will be an ideal response?

Computer Science & Information Technology

When you delete records in Access and save:

A) you can use the Redo button to restore a record. B) there is no warning message. C) you can use the Undo button to restore a record. D) any records deleted by mistake must be reentered.

Computer Science & Information Technology