A company uses PKI certificates stored on a smart chip enabled badge. The badge is used for a small number of devices that connect to a wireless network. A user
reported that their badge was stolen. Which of the following could the security administrator implement to prevent the stolen badge from being used to compromise
the wireless network?

A.
Asset tracking
B.
Honeynet
C.
Strong PSK
D.
MAC filtering
Asset Tracking Definition – In information technology, asset tracking is the process of keeping track of the movement of one or more IT assets…
0
0