List five guidelines for wireless security.
What will be an ideal response?
1. Turn on the wireless security features.
2. Use firewalls and intrusion detection on the LAN.
3. Improve authentication of the WLAN by incorporating 802.1x security features.
4. Consider using third-party encryption to protect wireless data.
5. Whenever possible, use encrypted services such as SSH and Secure FTP.
You might also like to view...
Which of the following is NOT a step in the CPU machine cycle?
A) Fetch B) Execute C) Decode D) Register
To centralize resources, businesses most likely will use a(n) ________ network
Fill in the blank(s) with correct word
Given a graphic that will appear on the Web site, you want to add shading to its interior to give it the appearance of silky fabric. Which effect in the Layer Style dialog box can you use?
a. Satin b. Interior Shading c. Fabric d. Color Overlay
Does Amazon Route 53 support NS Records?
A. Yes, it supports Name Service records. B. No C. It supports only MX records. D. Yes, it supports Name Server records.