What steps should be taken to lock down a WiFi network?

a. No SSID broadcast, non-default SSID, MAC access control, and WEP encryption
b. No SSID broadcast, non-default SSID, MAC access control, and WPA-PSK encryption
c. SSID broadcast, non-default SSID, MAC access control, and WPA-PSK encryption
d. SSID broadcast, non-default SSID, MAC access control, WEP encryption, and RADIUS authentication


b. No SSID broadcast, non-default SSID, MAC access control, and WPA-PSK encryption

Computer Science & Information Technology

You might also like to view...

An electronic ____ is an object you use to enter, update, and print records in a database.

A. page B. form C. control D. report

Computer Science & Information Technology

This is a device that transmits and receives data using optical fiber rather than electrical wire.

What will be an ideal response?

Computer Science & Information Technology

Apache OpenOffice is the standard in the business environment for office applications

Indicate whether the statement is true or false

Computer Science & Information Technology

Click item D in the figure above to see more suffix options.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology