Which of the following should Pete, the security administrator, change to help mitigate the risk associated with war drivers discovering the wireless network?

A. WPA encryption
B. WEP encryption
C. MAC filtering
D. AP power levels


Ans: D. AP power levels

Computer Science & Information Technology

You might also like to view...

From an application and system security standpoint, it is vitally important to ensure that every activity and task within the assurance process can be related to an ____.

A. established policy B. expected result C. indirect result D. observed result

Computer Science & Information Technology

Match each item with a statement below.

A. a saved state of a virtual machine that you can revert to B. a type of virtual hard disk that tracks changes that would have been made to a parent disk C. feature of Hyper-V that allows the memory allocated to a virtual machine to be increased and decreased based on demand D. a virtual hard disk that only uses the physical disk space required to store its contents E. a type of virtual hard disk that takes the same physical space on disk as the volume of data that it can store F. the software layer that controls access to hardware after virtualization is enabled G. a set of drivers that allows operating systems to use virtualized hardware in a virtual machine H. a type of virtual hard disk that is designed to be shared between multiple virtual machines I. a technology that allows the hardware of a single computer to be shared by multiple operating systems running at the same time

Computer Science & Information Technology

Display size corresponds to the ____ of the video window.

A. resolution B. dots C. height D. width

Computer Science & Information Technology

You can use Group Policy to enable auditing. Which of the following is not a place at which auditing can take place?

a. Domain controllers b. Member servers c. Client computers d. None of the above.

Computer Science & Information Technology