CYBERLAWS & ETHICAL HACKING Task : Identify security features of current wireless technologies. You are researching the following wireless security featur
CYBERLAWS & ETHICAL HACKING
Task : Identify security features of current wireless technologies.
You are researching the following wireless security features for your company network:
- WEP and WPA2
- MAC address filtering
- SSID broadcast
Answer the following question(s):
1. Which combination of wireless security technologies are most appropriate in the enterprise, and why?
2. Which combination of wireless security technologies are most appropriate for public access, and why?
Fully address the question(s) in this task; provide valid rationale for your choices, where applicable.