PrepAway - Latest Free Exam Questions & Answers

Which of the following components are typically required for securing a wireless 802.11 network?

Which of the following components are typically required for securing a wireless 802.11 network?
Each correct answer represents a complete solution. Choose all that apply.

PrepAway - Latest Free Exam Questions & Answers

A.
Network segmentation

B.
Monitoring

C.
AAA

D.
Data confidentiality

Explanation:
The components that are typically required for securing a wireless 802.11 network are as follows:
Data confidentiality: Data confidentiality is a security principle that ensures dataprivacy on the network system. It ensures that the data will be kept secret and will be accessed only by the limited authorized users. It prohibits eavesdropping by unauthorized users. Confidentiality of data has also been defined by the International organization for Standardization (ISO) in ISO-17799 as "ensuring that information is accessible only to the authorized users". Network segmentation:
Network segmentation in computer networking is the act or profession of splitting a computer network into subnetworks, each being a network segment or network layer. The advantages of such splitting are primarily for boosting performance and improving security.
Advantages:
Reduced congestion: Improved performance is achieved because on a segmented network, there are fewer hosts per subnetwork, thus minimizing local traffic. Improved security: Broadcasts will be contained to the local network. Internal network structure will not be visible from outside. Containing network problems: It limits the effect of local failures on other parts of the network. AAA.In computer security, AAA commonly stands for "authentication, authorization, and accounting". Authentication refers to the process where an entity’s identity is authenticated, typically by providing evidence that it holds a specific digital identity such as an identifier and the corresponding credentials. Authorization determines whether a particular entity is authorized to perform a given activity, typically logging on to an application or service. Accounting refers to the tracking of the consumption of network resources by users. This information may be used for management, planning, billing, or other purposes. Monitoring: Monitoring is one of the components required for securing a wireless 802.11 network. Monitoring is done in order to prevent possible attacks against a WLAN. It is important to monitor the wireless network once it is installed and designed. For proper monitoring, wireless intrusion detection system (WIDS) and wireless intrusion prevention system (WIPS) are used. Both WIDSs and WIPSs have the ability to detect valid and invalid devices on the network.
Reference: http://en.wikipediA.org/wiki/Wireless_network


Leave a Reply