PdfPrep.com

After completing the installation of a new overlay WIPS for the purpose of rogue detection and security monitoring at your corporate headquarters, what baseline function MUST be performed in order to identify the security threats?

After completing the installation of a new overlay WIPS for the purpose of rogue detection and security monitoring at your corporate headquarters, what baseline function MUST be performed in order to identify the security threats?
A . Separate security profiles must be defined for network operation in different regulatory domains.
B . WLAN devices that are discovered must be classified (rogue, authorized, neighbor, etc.) and a WLAN policy must define how to classify new devices.
C . Upstream and downstream throughput thresholds must be specified to ensure that service-level agreements are being met.
D . Authorized PEAP usernames must be added to the WIPS server’s user database.

Answer: B

Exit mobile version