What other steps does Bob have to take in order to successfully implement this?

Posted by: Pdfprep Category: CEH-001 Tags: , ,

Bob reads an article about how insecure wireless networks can be. He gets approval from his management to implement a policy of not allowing any wireless devices on the network.

What other steps does Bob have to take in order to successfully implement this? (Select 2 answer.)
A . Train users in the new policy.
B . Disable all wireless protocols at the firewall.
C . Disable SNMP on the network so that wireless devices cannot be configured.
D . Continuously survey the area for wireless devices.

Answer: A,D

Explanation:

If someone installs a access point and connect it to the network there is no way to find it unless you are constantly surveying the area for wireless devices. SNMP and firewalls can not prevent the installation of wireless devices on the corporate network.

Leave a Reply

Your email address will not be published.