Establishing usage restrictions and configuration/connection requirements for wireless access to the system provides criteria for organizations to support wireless access authorization decisions. Such restrictions and requirements reduce the susceptibility to unauthorized access to the system through wireless technologies. Wireless networks use authentication protocols which provide credential protection and mutual authentication. [SP 800-97] provides guidance on secure wireless networks.
0 of 1 Questions completed
You have already completed the checklist before. Hence you can not start it again.
Checklist is loading…
You must sign in or sign up to start the checklist.
You must first complete the following:
0 of 1 Questions answered correctly
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
1. Question2 point(s)
3.1.16 Assessment Objectives / Determination Statements by Requirements Checklist
(confirm all that apply)