Which of the following configurations of a wireless network would be considered MOST secure?
A. WEP using MAC Filtering
B. WEP and hiding the SSID
C. WPA2
D. WPA TKIP and hiding the SSID
Ans: C. WPA2
You might also like to view...
In a program that uses an endfile-controlled loop to compute product of a list of numeric input data, the product variable must be initialized to __________.
a. 0 b. 1 c. -1 d. the EOF value e. none of the above
Which statement is false? Normally, an applet __________.
a. is allowed to read files only on the server from which the applet was downloaded. b. can read files on any server that can be reached over the network. c. cannot read files on the system on which it executes. d. has dif erent file access rights than an application running on the same machine.
Grouping helps arrange data when you want to produce a report containing ____.
A. totals B. subtotals C. column borders D. row borders
Page borders may be added only to the first page of a document.
Answer the following statement true (T) or false (F)