nerdexam
(ISC)2(ISC)2

CISSP · Question #395

CISSP Question #395: Real Exam Question with Answer & Explanation

The correct answer is B: Configure the Access Points (AP) to use Wi-Fi Protected Access 2 (WPA2) encryption.. WPA2 is a security protocol that encrypts the data sent over wireless networks. It provides stronger protection than WEP or WPA, which are older and weaker protocols. WPA2 prevents unauthorized access to the wireless network and ensures the confidentiality of the information tran

Submitted by yuki_2020· Mar 5, 2026Communication and Network Security

Question

During a recent assessment an organization has discovered that the wireless signal can be detected outside the campus area. What logical control should be implemented in order to BFST protect One confidentiality of information traveling One wireless transmission media?

Options

  • AConfigure a firewall to logically separate the data at the boundary.
  • BConfigure the Access Points (AP) to use Wi-Fi Protected Access 2 (WPA2) encryption.
  • CDisable the Service Set Identifier (SSID) broadcast on the Access Points (AP).
  • DPerform regular technical assessments on the Wireless Local Area Network (WLAN).

Explanation

WPA2 is a security protocol that encrypts the data sent over wireless networks. It provides stronger protection than WEP or WPA, which are older and weaker protocols. WPA2 prevents unauthorized access to the wireless network and ensures the confidentiality of the information transmitted. Configuring the APs to use WPA2 is a logical control that can reduce the risk of wireless eavesdropping or interception outside the campus area.

Topics

#Wireless security#WPA2 encryption#Confidentiality#Signal leakage

Community Discussion

No community discussion yet for this question.

Full CISSP PracticeBrowse All CISSP Questions