To protect WLAN traffic from eavesdroppers, a variety of security standards and practices have been developed, including all of the following except what?

A) Enabling SSID broadcast
B) MAC address filtering
C) Preshared key
D) IEEE 802.1X


A
Explanation: If you enable SSID broadcast, it will be easier for intruders to detect your wireless network. Disabling SSID broadcast will increase wireless security.

Computer Science & Information Technology

You might also like to view...

Which standard Visual Basic function returns the periodic payment amount for a loan?

a. Pmt b. IPmt c. PPmt d. LPmt

Computer Science & Information Technology

____________ indexes and indexed views should be used sparingly because they must be updated whenever any of the data in the underlying tables changes.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Answer the following statements true (T) or false (F)

1. It is important for the analyst to determine the human needs of the users involved in a development project. 2. A systems analyst should never be hired specifically to address information systems issues within a business. 3. A systems analyst should never draw on professional expertise concerning computer hardware and software and their uses in the business. 4. As a systems analyst, you are an agent of change whenever you perform any of the activities in the systems development life cycle and are present and interacting with users and the business for an extended period of time. 5. Problem solving is never a good quality for a systems analyst.

Computer Science & Information Technology

The format of an IP address is four numbers separated by ____.

A. spaces B. dashes C. colons D. periods

Computer Science & Information Technology