Which of the following configurations of a wireless network would be considered MOST secure?
A. WEP using MAC Filtering
B. WEP and hiding the SSID
C. WPA2
D. WPA TKIP and hiding the SSID
Ans: C. WPA2
Computer Science & Information Technology
You might also like to view...
Which of the following can be accomplished through bootstrapping?
A. Install the most current security updates. B. Install the current version of the application. C. Configure Operating System (OS) services. D. All of the above.
Computer Science & Information Technology
Select the true statement below.
a. Paying to be listed preferentially in a search engine is considered by many organizations to be a justified cost of doing business. b. Submit your site to search engines before it is finished. c. It only takes a few minutes to be listed in a search engine. d. All of the statements above are true.
Computer Science & Information Technology