Are policies and procedures established and mechanisms configured and implemented to protect the wireless network environment perimeter and to restrict unauthorized wireless traffic? Jonathan van Driessen September 04, 2021 11:13 Yes. Related articles Are there enhanced security measures such as additional locks in areas where content is stored (e.g. server room, machine room)? Comments 0 comments Please sign in to leave a comment.