PrepAway - Latest Free Exam Questions & Answers

Which of the following wireless security policies helps to prevent the wireless enabled laptops from peer-to-p

Which of the following wireless security policies helps to prevent the wireless enabled laptops from peer-to-peer attacks when the laptops are used in public access network?

PrepAway - Latest Free Exam Questions & Answers

A.
Use Port Address Translation.

B.
Use firewall.

C.
Use security protocols.

D.
Use protocol analyzer.

Explanation:
A firewall is a tool to provide security to a network. It is used to protect an internal network or intranet against unauthorized access from the Internet or other outside networks. It restricts inbound and outbound access and can analyze all traffic between an internal network and the Internet. Users can configure a firewall to pass or block packets from specific IP addresses and ports. Use of security protocols such as https, ssh2, and ssl helps to prevent the wireless enabled laptops from peer-to-peer attacks when the laptops are used in public access network or wireless hotspots. Answer option D is incorrect. A protocol analyzer is a network diagnostic utility for viewing the current contents of a packet traveling on the network. Protocol analyzers are mainly used for performance measurement and troubleshooting. These devices connect to the network to calculate key performance indicators (KPI) to monitor the network and speed up troubleshooting activities. Answer option A is incorrect. Port Address Translation (PAT) is a feature of Cisco IOS NAT. It is used to translate internal private addresses to one or more outside (usually registered) IP addresses. This process is called address overloading. PAT uses unique source port number to distinguish between the conversations. It uses a translation table entry containing full address and source port information. PAT is also referred as NAT overloading and Network Address Port Translation (NAPT). PAT makes the local hosts on the LAN look as if they are using publicly registered IP address. Hosts on the Internet send packet to the access router having a public IP address. The router then translates the address to match the correct IP address on the hosts on the local LAN.

One Comment on “Which of the following wireless security policies helps to prevent the wireless enabled laptops from peer-to-p


Leave a Reply