After completing the installation of a new overlay WIPS for the purpose of rogue detection and security monitoring at your corporate headquarters, what baseline function MUST be performed in order to identify security threats?
I'm going with B too. Properly categorizing the network devices is key to setting up effective security monitoring. Anything less and you're flying blind.
B is definitely the right answer here. Classifying discovered WLAN devices is the crucial first step to identify security threats. Gotta know what's authorized and what's rogue!
Elenore
18 days agoGabriele
5 days agoStefan
22 days agoElenore
23 days agoCatalina
1 months agoAlfred
13 days agoReita
1 months agoStefan
1 months agoValene
1 months agoCarlee
14 days agoVanesa
1 months agoRutha
1 months agoFelix
1 months ago