policies

Section1 

Using the Internet and/or the Library, research and complete the following: 

In 1,000 or more words, respond to the following: 

Evaluate how to implement a secure wireless network using Active Directory and RADIUS server. 

Explain how to do this and provide it in a step-by-step implementation guide using screenshots and explanations. 

Section 2 

In 200 or more words for each answer, respond to the following: 

  • Explain step by step how a hacker would crack passwords, starting with extracting the hash file in a non-Active Directory and an Active Directory client.
  • Write a remote access cybersecurity policy for remote users. 
Tags: No tags