What should you do next to secure the wireless network?

You work as the security administrator at Certkiller .com. You want to implement a solution which
will secure the wireless network. The Certkiller .comwireless network environment uses access
points as repeaters.
What should you do next to secure the wireless network?

You work as the security administrator at Certkiller .com. You want to implement a solution which
will secure the wireless network. The Certkiller .comwireless network environment uses access
points as repeaters.
What should you do next to secure the wireless network?

A.
Force users to use complex passwords.

B.
Ensure that users are only using issued wireless cards.

C.
Implement WEP (Wired Equivalent Privacy).

D.
Force users to use Adhoc mode.

Explanation:
If every access point is secured to WEP standards, the entire range covered by the wireless
system will be encrypted to a security level that equals a conventional wired network, thus
preventing sniffing and unauthorized ‘drive by’ access.
Incorrect answers:
A: Making use of complex passwords is not the same as repeaters.
B: Ensuring that wireless cards are used is not the same as providing security in the form of
repeaters. This in fact might enhance the danger.
D: Adhoc mode is the same as a point-to-point (ad-hoc or wireless bridge), a network created
when two devices are brought within transmission range of each other. This is not the same as
security.
References:
Mike Pastore and Emmett Dulaney, Security+ Study Guide, 2nd Edition, Alameda , Sybex, 2004, p
186



Leave a Reply 0

Your email address will not be published. Required fields are marked *