A user is trying to connect to the wireless network in the office but is unable to establish a consistent connection. The computer alternates connecting between several similarly configured access points. Which of the following would be the BEST way to address this issues?
A. Adjust the signal strength of the access points with minimal coverage overlap.
B. Increase the pool in each of the access points to avoid running out of IPs.
C. Configure each access point to use a different method of encryption than the others.
D. Reconfigure each of the access points so that they broadcast different SSIDs.
Answer: A. Adjust the signal strength of the access points with minimal coverage overlap.
You might also like to view...
As shown in the output of the more /usr/include/stdio.h file, the value of the end-of-file constant, EOF, is (-1).
What will be an ideal response?
Select a project you have been involved with. Categorizing into methodological issues as defined in this chapter, describe the methodological trade-offs that occurred in the project.
What will be an ideal response?
__________ ensures that critical assets are sufficiently protected in a cost-effective manner.
A. IT control B. IT security management C. IT discipline D. IT risk implementations
__________ are a set of storage locations.
A. Processors B. PSWs C. Registers D. Control units