Which of the following wireless security policies helps to prevent the wireless enabled laptops from peer-to-p
Which of the following wireless security policies helps to prevent the wireless enabled laptops from peer-to-peer attacks when the laptops are used in public access network?
What will you do to accomplish this?
You work as a Network Administrator for NetTech Inc. The company has a Windows 2003 domain- based network. The company has a main office and several branch offices. You want to centralize the administration. Therefore, you implement a Remote Authentication Dial-In Service (RADIUS) server. Each branch office supports its own Routing and Remote Access Server. You remove the default remote access policy, as you want to secure communications and implement a single policy that requires all dial-up communications to use a 40-bit encryption. What will you do to accomplish this?
Each correct answer represents a part of the solution. Choose two.
Which of the following would be the best choice for you to use?
Your company is going to add wireless connectivity to the existing LAN. You have concerns about the security of the wireless access and wish to implement encryption. Which of the following would be the best choice for you to use?
which of the following, digital signatures are based?
On which of the following, digital signatures are based? Each correct answer represents a complete solution. Choose two.
Which of the following protocols defines split MAC mechanisms for controlling and provisioning of access point
Which of the following protocols defines split MAC mechanisms for controlling and provisioning of access points (APs)?
Which of the following security levels are applied on the network to prevent unauthorized access?
Which of the following security levels are applied on the network to prevent unauthorized access? Each correct answer represents a complete solution. Choose all that apply.
Which type of AP has this characteristic?
A Cisco Unified Wireless Network has an AP that does not rely on the central control device of the network. Which type of AP has this characteristic?
Which of the following policies are considered as a good starting point while designing a wireless security po
Which of the following policies are considered as a good starting point while designing a wireless security policy document?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following are NOT steps in securing your wireless connection?
You are concerned about attackers simply passing by your office, discovering your wireless network, and getting into your network via the wireless connection. Which of the following are NOT steps in securing your wireless connection?
Each correct answer represents a complete solution. Choose two.
attack occurs when a cracker is able to listen on network traffic and identify the MAC address of a computer w
Fill in the blank with the appropriate term. attack occurs when a cracker is able to listen on network traffic and identify the MAC address of a computer with network privileges.