A risk is identified that an attacker, given the right credentials, could potentially connect to the corporate network from a nearby business's parking lot. Which of the following controls can be put in place to reduce the likelihood of this occurring?

A. TKIP
B. Antenna placement
C. Power level controls
D. WPA
E. WPA2
F. Disable SSID broadcasting


Answr:
E. WPA2
F. Disable SSID broadcasting

Computer Science & Information Technology

You might also like to view...

Subroutines can be used in a flat transaction in an attempt to mimic the behavior of a subtransaction in the nested model: whenever a subtransaction aborts, the corresponding subroutine manually undoes any database updates it has performed and returns with status indicating failure. Explain why the nested model allows higher transaction throughput.

What will be an ideal response?

Computer Science & Information Technology

A ____ could be h1 or body.

A. declaration list B. value C. property D. selector

Computer Science & Information Technology

PDF stands for ________ Document Format

Fill in the blank(s) with correct word

Computer Science & Information Technology

Which type of file cannot be viewed in a text editor such as Notepad?

a. text file b. output file c. input file d. binary file

Computer Science & Information Technology