Guidelines for Securing Wireless 802.11 Networks
Follow these guidelines to secure wireless 802.11 networks MCSE 2003 exams:
Use WPA if it is supported by your wireless hardware.
Use 802.Ix if it is supported by your wireless hardware.
If neither WPA or 802.Ix is available, use open system authentication and configure WEP.
If 802.Ix, WPA, or both are not an option, use a VPN.Design the location of APs to eliminate or at least reduce the amount of wireless
access to your networks that can be found from outside your network.
This type provides certificate-based, mutual authentication. Both the RADIUS authentication server and wireless clients must have certificates.
No certificates are required, and authentication is not mutual.
user provides a user ID and password for authentication. This option is not considered secure because there is no protection for the user credentials, and the credentials are subject to dictionary attacks as with Challenge Handshake Protocol
(CHAP) protocol, which EAPMD5 is based on.
It is imperative that you develop free IT certification test questions and use a secure design for wireless networks. Doing this is difficult because the wireless standards themselves, and therefore the equipment built to meet the standards, have many security failings. To counter these limitations, you must know what they are.
Many design exercises are paper-based; however, to understand the technical capabilities that a design can incorporate, you should have some hancls-on experience with products. Where specific hands-on instruction is given, you will need at least two computers configured as specified in the “Getting Started” section at the beginning of this book.
Administrative templates can be used to restrict user access in the following two ways:
Administrative templates in the Computer Configuration area of a GPO can be used to restrict all users of the computer to which the GPO is applied.
Administrative templates in the User Configuration area of a CompTIA Security+ Exam can be used to restrict access by users to which the GPO is applied.