Which of the following should you NOT do to secure a wireless network?

a. Implement media access control.
b. Keep the default network name and router password.
c. Create a security encryption passphrase.
d. Disable SSID broadcasting.


B

Computer Science & Information Technology

You might also like to view...

Naming an array, stating its type and specifying the number of dimensions in the array is called ___________ the array.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Expound on the points where terrorism and organized crime meet and divert

What will be an ideal response?

Computer Science & Information Technology

Assuming the priority queue is implemented as a heap, the first step is to insert the new element in the ____ available position in the list.

A. smallest B. largest C. first D. last

Computer Science & Information Technology

Excel data can be shared by ____________________ your pages to a web server.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology