What will you do to accomplish the task?

You work as a Network Administrator for NetTech Inc. The company has a wireless local area
network (WLAN). You want to prevent your wireless access point from being accessed by intruders.
What will you do to accomplish the task?

You work as a Network Administrator for NetTech Inc. The company has a wireless local area
network (WLAN). You want to prevent your wireless access point from being accessed by intruders.
What will you do to accomplish the task?

A.
Implement auditing.

B.
Implement WEP.

C.
Implement SSL.

D.
Implement IPSec.

Explanation:

In order to prevent your wireless access point from being accessed by intruders, you will have to
implement Wired Equivalent Privacy (WEP) on
the network. WEP is a security protocol for wireless local area networks (WLANs). It is the most
commonly and widely accepted security
standard. Almost all the available operating systems, wireless access points, and wireless bridges
support this security standard. It has two

components, authentication and encryption. It provides security that is equivalent to wired networks
for wireless networks. WEP encrypts
data on a wireless network by using a fixed secret key. WEP incorporates a checksum in each frame
to provide protection against the attacks
that attempt to reveal the key stream.
Answer C is incorrect. Secure Sockets Layer (SSL) is a protocol used to transmit private documents
via the Internet. SSL uses a
combination of public key and symmetric encryption to provide communication privacy,
authentication, and message integrity. Using the SSL
protocol, clients and servers can communicate in a way that prevents eavesdropping and tampering
of data on the Internet. Many Web sites
use the SSL protocol to obtain confidential user information, such as credit card numbers. By
convention, URLs that require an SSL connection
start with https: instead of http:. By default, SSL uses port 443 for secured communication.
Answer A is incorrect. Auditing is used to track user accounts for file and object access, logon
attempts, system shutdown etc. This
enhances the security of the network. Before enabling auditing, the type of event to be audited
should be specified in the Audit Policy in User
Manager for Domains.
Answer D is incorrect. Internet Protocol Security (IPSec) is a standard-based protocol that provides
the highest level of VPN security.
IPSec can encrypt virtually everything above the networking layer. It is used for VPN connections
that use the L2TP protocol. It secures both
data and password.
IPSec cannot be used with Point-to-Point Tunneling Protocol (PPTP).



Leave a Reply 0

Your email address will not be published. Required fields are marked *