The company where Derek works has tasked him with setting up and securing a SOHO router. He wants to make sure the wireless network is secure and that no unauthorized person can gain access to the network.
What is the first step Derek should perform to secure the wireless router?
A. Disable SSID.
B. Set encryption standard.
C. Check radio power levels.
D. Change default user name and password.
Answer: D
You might also like to view...
A vector image that is displayed at the correct size and with the maximum number of colors supported by the computer is said to be:
a. encrypted b. compressed c. device independent d. an applet e. streaming
If you placed two images side by side and assigned each a width of 45%, how much room would be left for the margin, padding, and border?
A. 5% B. 10% C. 45% D. 100%
Risk __________ is the process of discovering and assessing the risks to an organization's operations and determining how those risks can be mitigated.
Fill in the blank(s) with the appropriate word(s).
Why does the ADT stack implementation of the push function leave to the calling function the responsibility to detect and respond to an overflow?
A. Because it is easier that way. B. Because we cannot assume that heap overflow is an error. That decision belongs to the application. C. Because it improves the performance of the function. D. Because ADTs cannot handle errors.