You are required to implement a WiFi hot-spot for the public. Which of the following should be used for secure access?

A. WEP and TKIP
B. WPA2 and AES
C. WPA and static IPs
D. WPA2 and MAC filtering


Answer: B. WPA2 and AES

Computer Science & Information Technology

You might also like to view...

What is @font-face rule?

What will be an ideal response?

Computer Science & Information Technology

Passwords can be up to _______ characters and can include numbers, symbols, uppercase letters, and lowercase letters.

A. 8 B. 16 C. 255 D. 164

Computer Science & Information Technology

"Start_Machine," a tag for a push button that starts a machine would be assigned the ____________________ data type.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Owners of a SharePoint site are not allowed to create additional lists and libraries or modify site structure or permissions

Indicate whether the statement is true or false

Computer Science & Information Technology