Securing Remote Network Location with Wireless Networking

Which Security Measure Should Be Used for a Remote Network Location?

Prev Question Next Question

Question

A network technician travels to a remote office to set up a new SOHO for the company.

Wireless networking should be used at the remote office.

The network technician sets up all the related wireless network equipment, and the last step is to connect the users' devices to the company network.

To complete this step, which of the following should be used to secure the remote network location?

A.

Host-based firewalls B.

WPA2/WPA C.

Open access D.

Port filtering.

B.

Explanations

A network technician travels to a remote office to set up a new SOHO for the company.

Wireless networking should be used at the remote office.

The network technician sets up all the related wireless network equipment, and the last step is to connect the users' devices to the company network.

To complete this step, which of the following should be used to secure the remote network location?

A.

Host-based firewalls

B.

WPA2/WPA

C.

Open access

D.

Port filtering.

B.

The best option for securing the remote network location for connecting the users' devices to the company network is to use WPA2/WPA.

WPA2/WPA (Wi-Fi Protected Access 2/Wi-Fi Protected Access) is a security protocol used to secure wireless networks. It uses a Pre-Shared Key (PSK) or a certificate-based authentication mechanism to provide secure access to the wireless network. This protocol provides strong encryption and prevents unauthorized access to the network.

Host-based firewalls are used to protect individual devices from network-based attacks. They are not suitable for securing the entire network as they do not provide security for wireless signals.

Open access means allowing anyone to access the wireless network without any authentication. This is not secure as it can lead to unauthorized access and data theft.

Port filtering is a security mechanism used to restrict access to specific network ports. It is not suitable for securing the wireless network as it does not provide encryption or authentication.

Therefore, WPA2/WPA is the best option for securing the remote network location and providing secure access to the company network.