Exam 12: Operational Support and Wireless Convergence
Briefly describe role-based access control.
To determine what access privileges to assign, one model that should be used is role-based access control (RBAC). Instead of setting permissions for each user or group, permissions are assigned to a position ("role") and then users and other objects are assigned to that role. The users and objects inherit all of the permissions for the role. For example, instead of creating a user account Jeff.Butterfield and assigning privileges to that account, the role Comptroller can be created based on the privileges that position should have. Then the user can be assigned to that role. Individuals can hold multiple roles in RBAC.
The flexibility of RBAC makes it not only easier to establish permissions based on job classification but also facilitates enforcing those permissions. RBAC is considered a major step in keeping a WLAN secure.
Why is it important to train and educate all network users?
A common misconception regarding security in an organization is that keeping wireless networks secure is the role of the technology staff and users have little to do with security. Nothing could be further from the truth. All computer users share responsibility for protecting the assets of an organization. Users need to receive training regarding the importance of securing information, the roles that they play in security, and the necessary steps they need to take to ward off attacks. Because new wireless attacks appear regularly and new security vulnerabilities are continuously being exposed, this training must be ongoing. User awareness is an essential element of security, demands that all users need continuous training in the new security defenses, and must be reminded of company security policies and procedures.
____, or controlling changes made to the WLAN after installation, is another key element of operational support.
B
____ allows computers and network equipment to gather data about network performance.
How does WPA Enterprise and WPA2 Enterprise models port-based authentication work?
The current 802.16 standard, known as ____________________, is officially IEEE 802.16-2004.
An important principle of good wireless network security design is dividing the network into smaller units, a practice known as ____.
The first generation of wireless cellular technology is known as ____.
In a wireless LAN access control is often performed by enterprise ____.
A(n) ____ is designed to stop an attack from occurring by uncovering and preventing an attack before it harms the WLAN.
The primary difference between 2G and 2.5G networks is that 2.5G networks are ____.
Monitoring tools for wired networks always provide the full array of features necessary for monitoring WLANs.
Known as ____________________, it is the mechanism for limiting access to resources based on the users' identity and their membership in various groups.
WiMAX is based on the IEEE ____ standard approved in June 2004.
All computer users share responsibility for protecting the assets of an organization.
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)