A company needs to implement a secure wireless system that would require employees to authenticate to the wireless network with their domain username and password. Which of the following would a network administrator deploy to implement these requirements? (Select TWO).

A. 802.1q
B. MAC address filtering
C. WPA2 Personal
D. WPA Enterprise
E. 802.1x


Answer:
D. WPA Enterprise
E. 802.1x

Computer Science & Information Technology

You might also like to view...

Forward and Back buttons work the same way as browser tabs.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Which statement is true about classes?

A. The class declaration should be contained in a .cpp file. B. An error will occur if the function is written within the class declaration. C. The class function definitions (source code) should be placed in the .cpp file. D. Class declarations and definitions (source code) should not be separated into different files.

Computer Science & Information Technology

On a form, the Navigation bar is located at the top

Indicate whether the statement is true or false

Computer Science & Information Technology

A table of ________ lists a variety of legal cases or other legal documents referred to in a legal brief

Fill in the blank(s) with correct word

Computer Science & Information Technology