Recently, your company implemented two wireless networks. Within days of implementation, you discover that unauthorized devices have connected to the wireless networks. You need to ensure that unauthorized devices are unable to connect to either wireless network. What should you do?

A. Deploy the wireless access points behind a firewall.
B. Deploy the wireless access points behind an intrusion prevention system (IPS).
C. Employ MAC filtering on the wireless access points.
D. Disable SSID broadcast on the wireless access points.

C
Explanation: You should employ MAC filtering on the wireless access points. In this situation, it would be best to allow only MAC addresses that you configure in the MAC filter to connect to the wireless networks.
Deploying the wireless access point behind a firewall or IPS would not provide the protection that you need. Currently, devices are able to connect to the wireless access points because the appropriate level of security is not deployed.
Disabling SSID broadcast on the wireless access points will not provide any level of security.

Computer Science & Information Technology

You might also like to view...

Which wildcard character matches a single character in the same position as the wildcard?

A) [!] B) * C) ? D) []

Computer Science & Information Technology

To test for multiple conditions, you would use a basic IIf function

Indicate whether the statement is true or false

Computer Science & Information Technology