Kim, a network administrator, is seeing workstations in building C authenticate to the building A wireless access point. Which of the following would resolve this issue?

A. Change the security method
B. Reduce the transmission power
C. Change the SSID
D. Change the frequency


Answer: B. Reduce the transmission power

Computer Science & Information Technology

You might also like to view...

Polymorphism refers to

a. the ability to assign multiple meanings to one function name. b. overriding base class functions. c. overloading functions d. none of the above

Computer Science & Information Technology

In the early 1980s, TCP/IP was used only in the United States.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Once you write and properly debug a function, you can use it in the program (or different programs) again and again without having to rewrite the same code repeatedly.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Which of the following fire extinguisher classifications should be used on an electrical fire?

A. Class A B. Class B C. Class C D. Class D

Computer Science & Information Technology