After consulting your written security policy, to meet the new demands of an industry standard with which your organization must be compliant, an administrator logs into your WLAN controller and changes the authentication and encryption configurations on all your APs.
The help desk becomes overwhelmed with calls from angry users stating that they can no longer access the network. One by one, the users are reconfigured to reconnect to the network, causing significant loss of time.
Which portion of a well-written security policy is most likely missing from your company’s wireless security policy that caused this problem?
A . External influence compliance
B . Authentication requirements
C . Encryption compliance
D . Change control process
E . User notification process
Answer: D
Latest CWSP-207 Dumps Valid Version with 440 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund