Which of the following actions will you take to accomplish the task?

You work as a Network Administrator for Tech Perfect Inc. The company has a Windows Active
Directory-based single domain single forest network. The functional level of the forest is Windows
Server 2003. The company has recently provided fifty laptops to its sales team members. You are
required to configure an 802.11 wireless network for the laptops. The sales team members must
be able to use their data placed at a server in a cabled network. The planned network should be
able to handle the threat of unauthorized access and data interception by an unauthorized user.
You are also required to prevent the sales team members from communicating directly to one
another. Which of the following actions will you take to accomplish the task?
Each correct answer represents a complete solution. Choose all that apply.

You work as a Network Administrator for Tech Perfect Inc. The company has a Windows Active
Directory-based single domain single forest network. The functional level of the forest is Windows
Server 2003. The company has recently provided fifty laptops to its sales team members. You are
required to configure an 802.11 wireless network for the laptops. The sales team members must
be able to use their data placed at a server in a cabled network. The planned network should be
able to handle the threat of unauthorized access and data interception by an unauthorized user.
You are also required to prevent the sales team members from communicating directly to one
another. Which of the following actions will you take to accomplish the task?
Each correct answer represents a complete solution. Choose all that apply.

A.
Configure the wireless network to use WEP encryption for the data transmitted over a wireless
network.

B.
Using group policies, configure the network to allow the wireless computers to connect to the
ad hoc networks only.

C.
Implement the open system authentication for the wireless network.

D.
Using group policies, configure the network to allow the wireless computers to connect to the
infrastructure networks only.

E.
Implement the IEEE 802.1X authentication for the wireless network.

Explanation:



Leave a Reply 0

Your email address will not be published. Required fields are marked *