Which of the following configurations of a wireless network would be considered MOST secure?

A. WEP using MAC Filtering
B. WEP and hiding the SSID
C. WPA2
D. WPA TKIP and hiding the SSID


Ans: C. WPA2

Computer Science & Information Technology

You might also like to view...

In a program that uses an endfile-controlled loop to compute product of a list of numeric input data, the product variable must be initialized to __________.

a. 0 b. 1 c. -1 d. the EOF value e. none of the above

Computer Science & Information Technology

Which statement is false? Normally, an applet __________.

a. is allowed to read files only on the server from which the applet was downloaded. b. can read files on any server that can be reached over the network. c. cannot read files on the system on which it executes. d. has dif erent file access rights than an application running on the same machine.

Computer Science & Information Technology

Grouping helps arrange data when you want to produce a report containing ____.

A. totals B. subtotals C. column borders D. row borders

Computer Science & Information Technology

Page borders may be added only to the first page of a document.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology