Changing the SSID on the access point and disabling SSID broadcast is sufficient security for most wireless networks.
Answer the following statement true (T) or false (F)
False
You might also like to view...
Microsoft Access is a spreadsheet software.
Answer the following statement true (T) or false (F)
Which of the following statements about asymmetric key cryptography is true?
A. Asymmetric key cryptography uses one shared key. B. Asymmetric key cryptography is also called private key cryptography. C. Asymmetric key cryptography uses two keys called public keys. D. Asymmetric key cryptography is also called public key cryptography.
A byte is uninformative because it provides only enough different combinations of 0s and 1s to represent 8 individual characters.
Answer the following statement true (T) or false (F)
When would a technician use plenum rated cable?
A. When installing cable in ceilings B. If transmission speeds greater than 100Mbps are required C. When installing cable in damp environments D. Where EMI may be an issue