WITH COMPLETE SOLUTIONS VERIFIED LATEST UPDATE
GRADED A++
Which of the following protocols is used to provide security for network traffic
transmitted across a
TCP/IP network?
IPSec
A government agency requires the utmost in WLAN security and is currently
creating an updated WLAN security policy to outline the security procedures to
be implemented on all wireless networks within the agency. Documentation
procedures for any security event in the agency require a detailed paper trail
including specifics on the time/date, physical location, and type of attack. What
tasks must be required by the new security policy to ensure adherence to the
documentation requirements?
(Choose three)
,A. Implementation of a wireless intrusion prevention system
B. In depth review of WIPS security event reports
C. Frequent customized WIPS security event reports
Given: ABC University is deploying a WLAN across 30 campus buildings to
provide wireless network and Internet access to 15,000 college students. ABC's
security policy mandates physical security of infrastructure network devices.
What would be the most effective steps for upholding ABC's physical security
requirements
throughout their network? (Choose two)
Use access points with non-removable antennas to prevent antenna theft.
Install access points in lockable ceiling-mount enclosures.
Which WLAN attacks does personal firewall software prevent?
Computer viruses from peer WLAN devices
You are a consultant, hired by ABC Corporation to perform a risk assessment and
impact analysis for intrusions on their new 802.11g WLAN. Which areas would
you weigh most heavily while performing these tasks for ABC Corp? (Choose
two)
, The legal implications of an intruder stealing sensitive data
The sensitivity of information sent over the wireless network
XYZ University has recently installed a secure WLAN solution. There have been
no problems with network intrusion, but due to the weekend entertainment
schedule of the university's social infrastructure, many access points in the
residence halls have be damaged or stolen. What are some ways to prevent this
type of security event from affecting network operation and security?
Install access points in lockable enclosures in the ceiling or on the wall of the facilities
According to its corporate security policy, ABC Company is creating a 'WLAN
Security and Performance' checklist to assure that all autonomous access point
deployments are consistently secure and maximize performance. What item does
not belong on such a checklist?
WIPS mode is enabled on each AP
Given: The phases of security policy development include:
1) Communication
2) Response and enforcement
3) Define and document
4) Monitoring and auditing