Exam 12: Operational Support and Wireless Convergence

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Briefly describe role-based access control.

Free
(Essay)
4.8/5
(38)
Correct Answer:
Verified

To determine what access privileges to assign, one model that should be used is role-based access control (RBAC). Instead of setting permissions for each user or group, permissions are assigned to a position ("role") and then users and other objects are assigned to that role. The users and objects inherit all of the permissions for the role. For example, instead of creating a user account Jeff.Butterfield and assigning privileges to that account, the role Comptroller can be created based on the privileges that position should have. Then the user can be assigned to that role. Individuals can hold multiple roles in RBAC.
The flexibility of RBAC makes it not only easier to establish permissions based on job classification but also facilitates enforcing those permissions. RBAC is considered a major step in keeping a WLAN secure.

Why is it important to train and educate all network users?

Free
(Essay)
4.8/5
(33)
Correct Answer:
Verified

A common misconception regarding security in an organization is that keeping wireless networks secure is the role of the technology staff and users have little to do with security. Nothing could be further from the truth. All computer users share responsibility for protecting the assets of an organization. Users need to receive training regarding the importance of securing information, the roles that they play in security, and the necessary steps they need to take to ward off attacks. Because new wireless attacks appear regularly and new security vulnerabilities are continuously being exposed, this training must be ongoing. User awareness is an essential element of security, demands that all users need continuous training in the new security defenses, and must be reminded of company security policies and procedures.

____, or controlling changes made to the WLAN after installation, is another key element of operational support.

Free
(Multiple Choice)
4.8/5
(28)
Correct Answer:
Verified

B

____ allows computers and network equipment to gather data about network performance.

(Multiple Choice)
4.8/5
(29)

How does WPA Enterprise and WPA2 Enterprise models port-based authentication work?

(Essay)
4.8/5
(34)

What elements can be identified using WLAN monitoring tools?

(Essay)
4.9/5
(39)

Why is operational support important for a WLAN?

(Essay)
4.9/5
(30)

At the heart of any secure WLAN is ____.

(Multiple Choice)
4.9/5
(26)

The current 802.16 standard, known as ____________________, is officially IEEE 802.16-2004.

(Short Answer)
4.9/5
(39)

What are the types of changes that can be made to an WLAN?

(Essay)
4.9/5
(41)

An important principle of good wireless network security design is dividing the network into smaller units, a practice known as ____.

(Multiple Choice)
4.9/5
(31)

The first generation of wireless cellular technology is known as ____.

(Multiple Choice)
4.8/5
(37)

In a wireless LAN access control is often performed by enterprise ____.

(Multiple Choice)
4.8/5
(39)

A(n) ____ is designed to stop an attack from occurring by uncovering and preventing an attack before it harms the WLAN.

(Multiple Choice)
4.8/5
(30)

The primary difference between 2G and 2.5G networks is that 2.5G networks are ____.

(Multiple Choice)
4.7/5
(34)

Monitoring tools for wired networks always provide the full array of features necessary for monitoring WLANs.

(True/False)
4.9/5
(27)

Known as ____________________, it is the mechanism for limiting access to resources based on the users' identity and their membership in various groups.

(Short Answer)
4.8/5
(30)

WiMAX is based on the IEEE ____ standard approved in June 2004.

(Multiple Choice)
4.8/5
(39)

Briefly describe traffic filtering.

(Essay)
4.8/5
(31)

All computer users share responsibility for protecting the assets of an organization.

(True/False)
5.0/5
(38)
Showing 1 - 20 of 42
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)