A risk is identified that an attacker, given the right credentials, could potentially connect to the corporate network from a nearby business's parking lot. Which of the following controls can be put in place to reduce the likelihood of this occurring?
A. TKIP
B. Antenna placement
C. Power level controls
D. WPA
E. WPA2
F. Disable SSID broadcasting
Answr:
E. WPA2
F. Disable SSID broadcasting
You might also like to view...
Subroutines can be used in a flat transaction in an attempt to mimic the behavior of a subtransaction in the nested model: whenever a subtransaction aborts, the corresponding subroutine manually undoes any database updates it has performed and returns with status indicating failure. Explain why the nested model allows higher transaction throughput.
What will be an ideal response?
A ____ could be h1 or body.
A. declaration list B. value C. property D. selector
PDF stands for ________ Document Format
Fill in the blank(s) with correct word
Which type of file cannot be viewed in a text editor such as Notepad?
a. text file b. output file c. input file d. binary file