- Describe basic security concerns as they relate to wireless networks.
- Assess the security vulnerabilities, including active protocols, to the unsecured network.
- Describe your selection of devices added to the network and their role in meeting the security needs of the network to include a justification of the WIPS or WIDS and encryption method selection.
- Determine how new devices changed the network design and affected configuration settings to include sensors used to monitor the network.
- Provide a rationale for all of your choices.