Your wireless network is configured with WEP encryption and has a limited number of users. You notice that there are some unauthorized connections on your access point. Which of the following steps will you take to enhance the security of your network? Each correct answer represents a part of the solution. Choose two.

A) Configure MAC filtering.

B) Configure WPA encryption.

C) Enable SSID broadcast.

D) Change channel configuration.


A) Configure MAC filtering.

B) Configure WPA encryption.

Computer Science & Information Technology

You might also like to view...

Consider the following function and code segment.

``` void One( int first, int & second ) { first = 17; second = first + 1; } int main() { // other code ... int j = 4; int k = 3; One(j, k); // other code .. } ``` After the call to One(j, k); what are the values of j and k? Why? a) j == 4, k == 3; b) j == 17, k == 18; c) j == 4, k == 18; d) j == 17, k == 3;

Computer Science & Information Technology

Keeping the File and Print Sharing enabled even if nothing is being shared on a computer is a good idea so that updates can be applied to this portion of the operating system in case they are ever reenabled

Indicate whether the statement is true or false

Computer Science & Information Technology

All application parts created by all users of the Access program are available in all Access database files on the computer and will be visible in the ____.

A. Application Parts gallery B. external data gallery C. Templates gallery D. SharePoint Lists

Computer Science & Information Technology

The ________ axis helps measure data from top to bottom in a chart.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology