List five steps that can be used to protect a home network.

What will be an ideal response?


1. Change the default factory passwords.
2. Change the default SSID.
3. Turn on encryption.
4. Turn off the SSID broadcast.
5. Enable MAC address filtering.

Computer Science & Information Technology

You might also like to view...

By default, libraries are sorted alphabetically by ____.

A. name B. type C. newest addition D. oldest addition

Computer Science & Information Technology

Which of the following social engineering types is based on the idea that if one person does it, others will, too?

a. Scarcity b. Authority c. Social validation d. Reciprocation

Computer Science & Information Technology

Just as objects are similar to adjectives, attributes resemble verbs that describe what and how an object does something.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

A(n) ____________________ is a potential weakness in our infrastructure that a threat might exploit.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology