Jacob wants to set up extra security on his wireless network; he currently uses WPA2. He wants to allow only his devices to connect to the network and reject devices that he does not own.
What extra wireless security should Jacob employ in on his wireless router?
A. WPS
B. Port forwarding
C. Disable SSID broadcasting
D. MAC filtering
Answer: D
You might also like to view...
If we post a program and try to construct a Turing machine to solve it but are not successful, does this prove that no Turing machine exists? If not, why would prove this?
Fill in the blank(s) with the appropriate word(s).
____ is an encryption algorithm developed by IBM in the 1970s for the U.S. National Bureau of Standards. PAS RSA DES BES DES
PAS RSA DES BES
Public organizations are often required to select technology products from vendors who submit the most cost-effective bid or competitive response to an RFP.
Answer the following statement true (T) or false (F)
A(n) ____________________ trail is a list of links that provides a path from the initial page you opened in a website to the page that you are currently viewing.
Fill in the blank(s) with the appropriate word(s).