A technician has been given the task to install a wireless network in a user's home. Which of the following should the technician consider when implementing the network? (Select TWO).

A. That there is strong encryption enabled and configured on the access point.
B. The user's home network has a correctly completed WHOIS entry.
C. The access point is broadcasting the SSID based upon manufacturer's standards.
D. There are no conflicts of channels in use by neighboring wireless networks.
E. There are redundant internal DNS names set in the access point's settings.
F. That the access point's MAC address is properly set in its configuration settings.


Answer:
A. That there is strong encryption enabled and configured on the access point.
D. There are no conflicts of channels in use by neighboring wireless networks.

Computer Science & Information Technology

You might also like to view...

Define an iptables rule that will reject incoming connections on the TELNET port.

What will be an ideal response?

Computer Science & Information Technology

You have decided to use SNAT and PAT on your small office network. At minimum, how many IP addresses must you obtain from your ISP for all five clients in your office to be able to access servers on the Internet?

What will be an ideal response?

Computer Science & Information Technology

What government security classification applies to materials that, if compromised, would cause serious damage to national security?

a. Sensitive but Unclassified b. Secret c. Confidential d. Top Secret

Computer Science & Information Technology

A primary key field is used to ensure that each record is ________

A) unique B) valid C) saved D) duplicated

Computer Science & Information Technology