An engineer must implement intrusion protection on the WLAN. The AP coverage is adequate and on-channel attacks are the primary concern. The building is historic, which makes adding APs difficult. Which AP mode and submode must be implemented?
An engineer must implement intrusion protection on the WLAN. The AP coverage is adequate and on-channel attacks are the primary concern. The building is historic, which makes adding APs difficult. Which AP mode and submode must be implemented?
An engineer must implement intrusion protection on the WLAN without compromising the existing coverage, especially in a historic building where adding new APs is difficult. Local mode allows the AP to serve clients while remaining largely on-channel, ensuring that the existing coverage is maintained. The WIPS (Wireless Intrusion Prevention System) submode adds the necessary protection against on-channel attacks. Therefore, the best implementation is AP mode: local with the submode: WIPS.
correct, the on-channel says no need to scan other channels.
Answer is D
https://www.cisco.com/c/en/us/td/docs/wireless/technology/wips/deployment/guide/WiPS_deployment_guide.html On-Channel vs. Off-Channel Scanning per wIPS Mode The figure below explains the radio’s behavior. When a radio is on its serving channel it is considered “on-channel”, when the radio is scanning other channels, it is considered “off-channel”. An AP in local mode is mostly “on-channel”, making it difficult to detect attackers “off-channel”. A monitor mode AP is always “off-channel”, but cannot server clients, the WSM module provides a great combination of both.
B is coreect
provided answer is correct
Both B and D would enable Intrusion protection. However, D is the best answer because the question states that the building is historic and adding APs is difficult. Therefore you would not want to switch existing client serving local access points to monitor mode as this would create coverage holes not easily filled by adding coverage. D keeps the access point client serving as well as implementing intrusion protection.
B is correct
Wrong, D is the correct
B is correct