Which of the following is NOT used to protect a wireless network?

A) Activating packet switching
B) Disabling SSID broadcast
C) Changing network name
D) Using security protocols


A

Computer Science & Information Technology

You might also like to view...

Which of the following is NOT a way that surge protectors prevent damage from severe surges?

A) Prevent electricity from exiting to your plugged in electronics B) Burn out the backup fuse C) Trip an alarm D) Pass excess current to a ground wire

Computer Science & Information Technology

Which of the following methods is used to create an attribute node with the nameage?

A. document.create(attribute,age) B. document.createAttribute(age) C. Document_createAttribute_age D. Document_createAttribute(attribute,age)

Computer Science & Information Technology

What are the two major types of frame structures?

a. Low speed and high speed. b. High speed and EBCDIC. c. CCITT and low speed. d. EBCDIC and CCITT.

Computer Science & Information Technology

A user with programming experience may use an assembler program (also called a __________ ) on a file to scramble bits, in order to secure the information contained inside.?

A. ?compiler B. shifter C. ?macro D. ?script

Computer Science & Information Technology