Youneedtodesignamethodtoprotecttrafficonthewirelessnetwork.Yoursolutionmustmeettherequirementsofthechiefsecurityofficer.Whatshouldyoudo?() A.ConfigurethewirelessaccesspointsinDenverandDallastofilterunauthorizedMediaAccessControl(MAC)addressesB.ConfigurethewirelessnetworkconnectionpropertiesforallcomputersinDenverandinDallastousethesamenetworknamethatthewirelessaccesspointsuseC.CreateaGPOandlinkittotheDenverOUandtotheDallasOU.CreateawirelessnetworkpolicyandconfigureittouseWindowstoconfigurewirelessnetworksettingsfortheDenverandtheDallasnetworksD.CreateaGPOandlinkittotheDenverOUandtotheDallasOU.CreateawirelessnetworkpolicyandenabledataencryptionanddynamickeyassignmentsfortheDenverandDallasnetworks
Youneedtodesignamethodtoprotecttrafficonthewirelessnetwork.Yoursolutionmustmeettherequirementsofthechiefsecurityofficer.Whatshouldyoudo?()
A.ConfigurethewirelessaccesspointsinDenverandDallastofilterunauthorizedMediaAccessControl(MAC)addresses
B.ConfigurethewirelessnetworkconnectionpropertiesforallcomputersinDenverandinDallastousethesamenetworknamethatthewirelessaccesspointsuse
C.CreateaGPOandlinkittotheDenverOUandtotheDallasOU.CreateawirelessnetworkpolicyandconfigureittouseWindowstoconfigurewirelessnetworksettingsfortheDenverandtheDallasnetworks
D.CreateaGPOandlinkittotheDenverOUandtotheDallasOU.CreateawirelessnetworkpolicyandenabledataencryptionanddynamickeyassignmentsfortheDenverandDallasnetworks