You work as a network administrator at Bilco Engineering, Inc. The Bilco Engineering, Inc. employees require connecting to the Bilco Engineering, Inc. network using wireless technology.
You have received instruction to start the design of a Security strategy for the wireless network at all resort locations.
What should you do?
A.
All wireless access points should be configured to require the Wired Equivalent Privacy (WEP)
protocol for all connections. A Group Policy object (GPO) should be used to distribute the WEP keys to all computers in the domain.
B.
IPSec policies should be established on all company servers to request encryption from all computers that connect from the wireless IP networks.
C.
On a domain controller Internet Authentication Service (IAS) should be installed. Configure The wireless access points should be configured to require IEEE 802.1x authentication
D.
The wireless access points should be connected to a dedicated subnet. The subnet should be allowed direct access to the Internet, but not to the company network. The Bilco Engineering, Inc. users should be required to establish a VPN to access company resources.