Which of the following can she implement to prevent unauthorized users from connecting to the network?

Jane, the security administrator, is having issues with unauthorized users connecting to the
wireless network. For administrative reasons, she cannot implement any wireless encryption
methods. Which of the following can she implement to prevent unauthorized users from
connecting to the network?

Jane, the security administrator, is having issues with unauthorized users connecting to the
wireless network. For administrative reasons, she cannot implement any wireless encryption
methods. Which of the following can she implement to prevent unauthorized users from
connecting to the network?

A.
NIPS

B.
Disable unused ports

C.
MAC filtering

D.
WEP



Leave a Reply 0

Your email address will not be published. Required fields are marked *