A network administrator is implementing a wireless honeypot to detect wireless breach attempts. The honeypot must implement weak encryption to lure malicious users into easily breaking into the network. Which of the following should the network administrator implement on the WAP?
A. WPA
B. WPA2
C. WEP
D. VPN
Answer: C. WEP
Computer Science & Information Technology
You might also like to view...
If the user clicks the Open button, the Open File Dialog control's Show Dialog method returns the value ____________.
a. Result.True b. Dialog Result OK c. Dialog Result Open d. Result Open File
Computer Science & Information Technology
A __________ is a dispatchable unit of work that executes sequentially and is interruptible so that the processor can turn to another thread.
A) ?port ? B) ?process ? C) ?token ? D) ?thread
Computer Science & Information Technology
Which of the following applications is NOT part of an office application suite?
A) spreadsheet B) financial C) database D) presentation
Computer Science & Information Technology
The ____________________ attribute is used to merge cells across rows.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology