List five steps that can be used to protect a home network.
What will be an ideal response?
1. Change the default factory passwords.
2. Change the default SSID.
3. Turn on encryption.
4. Turn off the SSID broadcast.
5. Enable MAC address filtering.
You might also like to view...
By default, libraries are sorted alphabetically by ____.
A. name B. type C. newest addition D. oldest addition
Which of the following social engineering types is based on the idea that if one person does it, others will, too?
a. Scarcity b. Authority c. Social validation d. Reciprocation
Just as objects are similar to adjectives, attributes resemble verbs that describe what and how an object does something.
Answer the following statement true (T) or false (F)
A(n) ____________________ is a potential weakness in our infrastructure that a threat might exploit.
Fill in the blank(s) with the appropriate word(s).