Answer the following statements true (T) or false (F)

1. The concerns for wireless security, in terms of threats, and countermeasures, are different to those found in a wired environment, such as an Ethernet LAN or a wired wide-area network.
2. The most significant source of risk in wireless networks in the underlying communications medium.
3. The wireless access point provides a connection to the network or service.
4. The transmission medium carries the radio waves for data transfer.
5. Company wireless LANs or wireless access points to wired LANs in close proximity may create overlapping transmission ranges.


1. False
2. True
3. True
4. True
5. True

Computer Science & Information Technology

You might also like to view...

In order to animate text, select the text and click the ________ tab

Fill in the blank(s) with correct word

Computer Science & Information Technology

What does the term wetware refer to?

a. humans operating computers b. evil crackers c. "good" hackers d. a system vulnerability

Computer Science & Information Technology

To define the distance between the edges of each cell in a table use the ________ attribute.

a. cellpad b. cellpadding c. cellspacing d. cellborder.

Computer Science & Information Technology

Match each of the following generations to its language:I.1GLII.2GLIII.3GLIV.4GLV.5GLA.assembly languageB.SQLC.machine languageD.PrologE.COBOL

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology