The ________ is also known as the wireless network name
a.domain
b.homegroup
c.service set identifier
d.wireless access point
C
Computer Science & Information Technology
You might also like to view...
Which organization issues the Top 20 list of current network vulnerabilities?
a. SANS Institute b. ISECOM c. EC-Council d. OPST
Computer Science & Information Technology
The practice of searching the Internet for unprotected computers is called a(n) ____________________.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology