Mechanisms exist to protect wireless access through authentication and strong encryption.
Does the organization protect wireless access through authentication and strong encryption?