Which of the following could the security administrator…

A company uses PKI certificates stored on a smart chip enabled badge. The badge is used for a small number of devices that connect to a wireless network. A user
reported that their badge was stolen. Which of the following could the security administrator implement to prevent the stolen badge from being used to compromise
the wireless network?

A company uses PKI certificates stored on a smart chip enabled badge. The badge is used for a small number of devices that connect to a wireless network. A user
reported that their badge was stolen. Which of the following could the security administrator implement to prevent the stolen badge from being used to compromise
the wireless network?

A.
Asset tracking

B.
Honeynet

C.
Strong PSK

D.
MAC filtering



Leave a Reply 1

Your email address will not be published. Required fields are marked *

10 + five =


Mike

Mike

Asset Tracking Definition – In information technology, asset tracking is the process of keeping track of the movement of one or more IT assets…