Which of the following are two wireless security policy items that you should implement to safeguard your data?

You are a network administrator at Certkiller .com. You frequently work from home and wireless
hotspots, rather than commuting to the office. Your laptop hooks up to the office network via
WLANs. Which of the following are two wireless security policy items that you should implement to
safeguard your data? (Select TWO.)

You are a network administrator at Certkiller .com. You frequently work from home and wireless
hotspots, rather than commuting to the office. Your laptop hooks up to the office network via
WLANs. Which of the following are two wireless security policy items that you should implement to
safeguard your data? (Select TWO.)

A.
Use an IPSec VPN for remote connectivity

B.
Use an HTTPS captive portal

C.
Use a personal firewall on his laptop

D.
Use a protocol analyzer on his laptop to sniff WLAN traffic for risks

E.
Use 802.1X/PEAPv0 to connect to the office network

Explanation:
The VPN would guarantee that the connection between you and your workplace is secure. A
personal Firewall on you computer will protect you when using potentially unsecure wireless
networks to VPN to you office.



Leave a Reply 0

Your email address will not be published. Required fields are marked *