If you are configuring your WLAN for security, and you configure the access points with a security feature that the clients do not support, what can you add to the clients to have them participate in the WLAN?
You are the firewall administrator at your company and the network administrators have decided to implement a PPTP VPN solution, which of these ports would you need to allow through the firewall to allow these VPN sessions into your network?
As Intrusion Detection Systems become more sophisticated, the software manufacturers develop different methods of detection. If an IDS uses the process of matching known attacks against data collected in your network, what is this known as?
If you configure an access-list to block the following networks, what are you trying to protect against? Network 127.0.0.0/8, Network 0.0.0.0/0 Network 10.0.0.0/8 Network 172.16.0.0/16, and Network 192.168.0.0/16.
During a training presentation, that you are delivering, you are asked how wireless networks function, compared to the OSI Model. What two layers of the OSI Model are addressed by the 802.11 standards?