Risk of a security breech resulting from a rogue wireless


After evaluating the risks of a rogue wireless network, Mark Lee decides that he must convince the IT director that the company needs a wireless network security policy even if they do not want to sponsor a wireless network. Which of the following strategies would reduce the risk of a security breech resulting from a rogue wireless network? (Choose all that apply.)

a. Deploying an IT-managed WAP with WEP encryption and 802.1X authentication.

b. Publishing instructions for other employees to access the current employee-managed WAP.

c. Educating internal employees about the risks associated with wireless networks.

d. Publishing a wireless network security policy forbidding employee-managed WAPs.

e. Deploying an IT-managed WAP using open network authentication without encryption.

f. Publishing a wireless network security policy allowing employee-managed WAPs, as long as they have authentication and encryption enabled.

Request for Solution File

Ask an Expert for Answer!!
Computer Network Security: Risk of a security breech resulting from a rogue wireless
Reference No:- TGS098953

Expected delivery within 24 Hours