Your network recently upgraded the wireless network to require WPA2. After the upgrade it is discovered that several important wireless clients only support WEP and have no upgrade to path put them in compliance. Which of the following steps should be taken to allow these clients access until they can upgrade? (Choose two)

A. Create a separate SSID and WEP key on a new network segment.
B. Only allow required communication paths.
C. Enable detection of rogue APs.
D. Require the legacy clients to install antivirus softwar.e


A,B
Explanation: You should create a separate SSID and WEP key on a new network segment and only allow required communication paths. While enabling detection of rogue APs and installing antivirus software are good security measures, they do not address this issue at all.

Computer Science & Information Technology

You might also like to view...

Explain how Buchholz created a error-detecting name for the memory unit

What will be an ideal response?

Computer Science & Information Technology

The ________ bar in Internet Explorer 11 can be used to enter a URL

Fill in the blank(s) with correct word

Computer Science & Information Technology

If you want to resize just a few controls on a form they must be removed from the Layout control.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

_____________ is the ability to add and remove devices to a computer while the computer is running and have the operating system automatically recognize the change.

A. plug and play B. hot swapping C. plug-ins D. modularity E. none of the above

Computer Science & Information Technology