Live Virtual Machine Lab 6.2: Module 06 Troubleshooting and Securing Wireless Networks
Which protocol is used for generating preshared keys?
Temporal Key Integrity Protocol (TKIP)
Which is the orientation of the antenna concerning the surface of the earth?
Antenna Polarization
When is a site survey done for a wireless network?
Before deployment
Which type of portal is used for wireless client authentication?
Captive
You have several visitors who come to your office every day and connect to the corporate wireless network. You want to secure the wireless network and limit wireless network access for the visitors. They should not be able to connect to the systems on the corporate wireless network. Which method should you use?
Create a guest wireless network