Which of the following is the MOST secure wireless encryption?
A. ESSID
B. WPA
C. WPA2
D. WEP
Answer: C. WPA2
You might also like to view...
When creating a bulleted or numbered list, each time you press the _____ key, PowerPoint generates a new bullet or number.
A. Enter B. Space C. New Bullet D. New Item
A valuable tool to have at your disposal when preparing or checking cables is a cable ____________________.
Fill in the blank(s) with the appropriate word(s).
A(n) _____ is a field or set of fields that uniquely identify a record.
Fill in the blank(s) with the appropriate word(s).
Match the causes to their effects:
1. Computer security failure 2. Strike 3. Accident 4. Technological breakdown 5. Sabotage and terrorism A. flooding caused by a waterline break B. requires special security measures to be put into place C. by far the most insidious threat to an organization D. hackers get in without any notice E. utility failures