What other steps does Bob need to take to successfully implement this?

Bob reads an article about how insecure wireless networks can be. He gets approval from his management to implement a policy of not allowing any wireless devices on the network. What other steps does Bob need to take to successfully implement this?

Bob reads an article about how insecure wireless networks can be. He gets approval from his management to implement a policy of not allowing any wireless devices on the network. What other steps does Bob need to take to successfully implement this?

A.
Disable all wireless protocols at the firewall

B.
Disable SNMP on the network so wireless devices cannot be configured

C.
Continuously survey the area for wireless devices

D.
Purchase a device that jams wireless signals

E.
Train users in the new policy

Explanation:
If someone installs a access point and connect it to the network there is no way to find it unless you are constantly surveying the area for wireless devices. SNMP and firewalls can not prevent the installation of wireless devices on the corporate network.



Leave a Reply 2

Your email address will not be published. Required fields are marked *


seenagape

seenagape

I agree with the answer. CE

Ghost Man

Ghost Man

C is the Right Ans.