Managing Risk Inherent to Wireless Networks | CRISC Exam Prep

Best Practices for Managing Risk in Wireless Networks

Prev Question Next Question

Question

Which of the following is the BEST way of managing risk inherent to wireless network?

Answers

Explanations

Click on the arrows to vote for the correct answer

A. B. C. D.

B.

As preventive control and prevention is preferred over detection and recovery, therefore, private and key-based encryption should be adopted for managing risks.

Incorrect Answers: A, C, D: As explained in above section preventive control and prevention is preferred over detection and recovery, hence these are less preferred way.

Out of the given options, the BEST way to manage risk inherent to a wireless network is to require private, key-based encryption to connect to the wireless network (Option B).

Wireless networks are more vulnerable to security breaches than wired networks because they broadcast signals over the airwaves, which can be intercepted and accessed by unauthorized individuals. As a result, it is critical to take steps to mitigate the risks associated with wireless networks.

Private, key-based encryption is a type of encryption in which a private key is used to encrypt and decrypt data. The key is shared between the sender and the receiver and is not disclosed to anyone else. This method ensures that data is protected and secure from unauthorized access. By requiring key-based encryption to connect to the wireless network, organizations can limit access to authorized users who have the necessary keys to connect.

Enabling auditing on every host that connects to a wireless network (Option A) and enabling auditing on every connection to the wireless network (Option D) are both good practices, but they are not the best way to manage risk inherent to a wireless network. Auditing is a reactive measure, and it does not prevent unauthorized access to the wireless network.

Requiring that every host that connects to this network have a well-tested recovery plan (Option C) is also not the best way to manage risk inherent to a wireless network. While having a recovery plan is important, it does not prevent security breaches from occurring in the first place. Additionally, this option assumes that every host on the network is equally secure, which may not be the case.

In summary, requiring private, key-based encryption to connect to the wireless network is the best way to manage risk inherent to a wireless network because it limits access to authorized users who have the necessary keys to connect, thereby mitigating the risk of unauthorized access and security breaches.