In which of the following ways can Mark add anotherlevel of security after implanting encryption techniques for the business wireless traffic?

Mark works as a Systems Administrator for TechMart Inc. The company has a Windows-based network. The company is adding an open, high-speed, wireless access for their customers and secured wireless for employees at all 37 branches. He wants to check thevarious security concerns for ensuring that business traffic is secured. He is also under pressure to make this new feature a winning strategy for a company.
In which of the following ways can Mark add anotherlevel of security after implanting encryption techniques for the business wireless traffic? Each correct answer represents a complete solution. Choose all that apply.

Mark works as a Systems Administrator for TechMart Inc. The company has a Windows-based network. The company is adding an open, high-speed, wireless access for their customers and secured wireless for employees at all 37 branches. He wants to check thevarious security concerns for ensuring that business traffic is secured. He is also under pressure to make this new feature a winning strategy for a company.
In which of the following ways can Mark add anotherlevel of security after implanting encryption techniques for the business wireless traffic? Each correct answer represents a complete solution. Choose all that apply.

A.
Hide the Service Set Identifier (SSID)

B.
Configure the network to use only Extensible Authentication Protocol (EAP)

C.
Implement access point isolation and

D.
Use MAC filtering



Leave a Reply 0

Your email address will not be published. Required fields are marked *