Which of the following can she implement to prevent unauthorized users from connecting to the network?

Jane, the security administrator, is having issues with unauthorized users connecting to the wireless network. For administrative reasons, she cannot implement any wireless encryption methods. Which of the following can she implement to prevent unauthorized users from connecting to the network?

Jane, the security administrator, is having issues with unauthorized users connecting to the wireless network. For administrative reasons, she cannot implement any wireless encryption methods. Which of the following can she implement to prevent unauthorized users from connecting to the network?

A.
NIPS

B.
Disable unused ports

C.
MAC filtering

D.
WEP



Leave a Reply 0

Your email address will not be published. Required fields are marked *