You are required to implement a WiFi hot-spot for the public. Which of the following should be used for secure access?
A. WEP and TKIP
B. WPA2 and AES
C. WPA and static IPs
D. WPA2 and MAC filtering
Answer: B. WPA2 and AES
Computer Science & Information Technology
You might also like to view...
What is @font-face rule?
What will be an ideal response?
Computer Science & Information Technology
Passwords can be up to _______ characters and can include numbers, symbols, uppercase letters, and lowercase letters.
A. 8 B. 16 C. 255 D. 164
Computer Science & Information Technology
"Start_Machine," a tag for a push button that starts a machine would be assigned the ____________________ data type.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
Owners of a SharePoint site are not allowed to create additional lists and libraries or modify site structure or permissions
Indicate whether the statement is true or false
Computer Science & Information Technology