New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

ISC2 CISSP Exam - Topic 3 Question 83 Discussion

Actual exam question for ISC2's CISSP exam
Question #: 83
Topic #: 3
[All CISSP Questions]

A security practitioner is tasked with securing the organization's Wireless Access Points (WAP). Which of these is the MOST effective way of restricting this environment to authorized users?

Show Suggested Answer Hide Answer
Suggested Answer: B

Contribute your Thoughts:

0/2000 characters
Ira
3 months ago
Wait, people still use WEP? That's wild!
upvoted 0 times
...
Gertude
3 months ago
I thought MAC address filtering was pretty effective, but I've heard it can be spoofed.
upvoted 0 times
...
Lenna
3 months ago
Changing the SSID is just a distraction, not a real security measure.
upvoted 0 times
...
Janella
4 months ago
Disabling SSID broadcast doesn't really stop determined hackers.
upvoted 0 times
...
Anika
4 months ago
WPA2 is a must for securing WAPs!
upvoted 0 times
...
Judy
4 months ago
I vaguely recall that MAC address filtering can be bypassed, so I’m not sure if that’s the best option either. It’s tricky!
upvoted 0 times
...
Robt
4 months ago
Changing the SSID to something random seems like a good idea, but I feel like it might not really stop determined attackers.
upvoted 0 times
...
Hollis
4 months ago
I think disabling SSID broadcast can help, but I’m not convinced it’s the most effective method. I’ve seen practice questions where it was more about encryption.
upvoted 0 times
...
Ashton
5 months ago
I remember studying that WPA2 is crucial for securing wireless networks, but I’m not sure if it’s the only thing we should rely on.
upvoted 0 times
...
Son
5 months ago
Creating MAC address-based ACLs could work, but that can be a pain to manage, especially in a larger organization. I think WPA2 is the simplest and most effective solution for this scenario.
upvoted 0 times
...
Eric
5 months ago
Enabling WPA2 encryption is definitely the way to go here. That provides strong encryption and authentication to keep unauthorized users off the network. The other options might add some security, but WPA2 is the clear winner in my opinion.
upvoted 0 times
...
Terrilyn
5 months ago
I'm a bit unsure about this one. Disabling SSID broadcast or changing the SSID name might help, but I'm not sure if those are the most effective methods. I'll have to think this through carefully.
upvoted 0 times
...
Kimbery
5 months ago
Hmm, this seems like a straightforward wireless security question. I think enabling WPA2 encryption is the most effective way to restrict access to authorized users.
upvoted 0 times
...
Mabel
5 months ago
Hmm, service composability - that's about being able to combine services in different ways, right? I'll need to review the principles and see which ones support that.
upvoted 0 times
...
Vallie
5 months ago
This one seems pretty straightforward. I'm pretty sure the answer is Integrity, since that's a key technical safeguard.
upvoted 0 times
...
Chantell
5 months ago
I've got a good feeling about this one. The question is pretty straightforward - it's just asking which controller the orphaned APs will join. I think I can narrow it down based on the controller characteristics provided in the answer choices.
upvoted 0 times
...
Tammy
10 months ago
Haha, disabling SSID? Next, they'll be telling us to use 'password123' as the passphrase. Security through obscurity is so 90s.
upvoted 0 times
Tamar
9 months ago
D) Create Access Control Lists (ACL) based on Media Access Control (MAC) addresses
upvoted 0 times
...
Lucy
9 months ago
B) Disable the broadcast of the Service Set Identifier (SSID) name
upvoted 0 times
...
Aliza
9 months ago
A) Enable Wi-Fi Protected Access 2 (WPA2) encryption on the wireless access point
upvoted 0 times
...
...
Aretha
10 months ago
MAC address ACLs, huh? That's like having a bouncer at the door who only recognizes the cool kids. Not exactly inclusive, is it?
upvoted 0 times
Brigette
8 months ago
C: D) Create Access Control Lists (ACL) based on Media Access Control (MAC) addresses
upvoted 0 times
...
Jenelle
10 months ago
B: B) Disable the broadcast of the Service Set Identifier (SSID) name
upvoted 0 times
...
Naomi
10 months ago
A: A) Enable Wi-Fi Protected Access 2 (WPA2) encryption on the wireless access point
upvoted 0 times
...
...
Jolene
10 months ago
A random SSID name? Seriously? That's like trying to hide your identity with a fake mustache. It's not fooling anyone.
upvoted 0 times
...
Effie
10 months ago
Disabling SSID broadcast? Pfft, that's like putting a 'kick me' sign on your back. Not secure at all.
upvoted 0 times
Luis
10 months ago
D) Create Access Control Lists (ACL) based on Media Access Control (MAC) addresses
upvoted 0 times
...
Henriette
10 months ago
A) Enable Wi-Fi Protected Access 2 (WPA2) encryption on the wireless access point
upvoted 0 times
...
...
Germaine
10 months ago
WPA2 encryption is definitely the way to go! It's the industry standard for secure wireless access.
upvoted 0 times
...
Edmond
11 months ago
I believe creating ACLs based on MAC addresses is also a good option to restrict access.
upvoted 0 times
...
Yvonne
11 months ago
I agree with Alethea, WPA2 encryption provides strong security for WAP.
upvoted 0 times
...
Alethea
11 months ago
I think the most effective way is to enable WPA2 encryption.
upvoted 0 times
...

Save Cancel