Mechanisms exist to protect wireless access via secure authentication and encryption.
Does the organization protect wireless access via secure authentication and encryption?