New Year Sale ! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

CWNP Exam CWSP-207 Topic 1 Question 20 Discussion

Actual exam question for CWNP's CWSP-207 exam
Question #: 20
Topic #: 1
[All CWSP-207 Questions]

After completing the installation of a new overlay WIPS for the purpose of rogue detection and security monitoring at your corporate headquarters, what baseline function MUST be performed in order to identify security threats?

Show Suggested Answer Hide Answer
Suggested Answer: B

Contribute your Thoughts:

Reita
6 days ago
I agree, we should define a WLAN policy for that.
upvoted 0 times
...
Stefan
8 days ago
I think we need to classify WLAN devices first.
upvoted 0 times
...
Valene
10 days ago
B is definitely the right answer here. Classifying discovered WLAN devices is the crucial first step to identify security threats. Gotta know what's authorized and what's rogue!
upvoted 0 times
Rutha
2 days ago
Once classified, we can then define policies on how to handle each type of device.
upvoted 0 times
...
Felix
3 days ago
I agree, classifying WLAN devices is key to identifying security threats.
upvoted 0 times
...
...

Save Cancel