During a disaster recovery test, several billing representatives need to be temporarily setup to take payments from customers. It has been determined that this will need to occur over a wireless network, with security being enforced where possible. Which of the following configurations should be used in this scenario?

A. WPA2, SSID enabled, and 802.11n.
B. WEP, SSID enabled, and 802.11b.
C. WEP, SSID disabled, and 802.11g.
D. WPA2, SSID disabled, and 802.11a


Answer: D. WPA2, SSID disabled, and 802.11a

Computer Science & Information Technology

You might also like to view...

Answer the following statements true (T) or false (F)

1) Design patterns are restricted to particular programming languages, of which C++ is one. 2) UML is graphical language for designing programs. 3) UML requires that the programmer understand every detail and dark corner of C++ to be useful. 4) A pattern is a design principle that solves a problem that occurs over and over.

Computer Science & Information Technology

________ consists of these four components: input, processing, storage, and output

A) The Turing test B) Bioinformatics C) The information processing cycle D) Unicode

Computer Science & Information Technology

The Author name area is generated from ________

A) your current computer B) the last time you accessed the file C) the computer where you stored the file D) the computer where the file originated

Computer Science & Information Technology

How are boxes laid out in the normal flow for block-level elements?

A. vertically B. horizontally C. side-by-side D. perpendicular

Computer Science & Information Technology