When implementing wireless network security, both the _______________ and the _______________ must use the same authentication scheme.
Fill in the blank(s) with the appropriate word(s).
WAP; wireless NICs
correct
Computer Science & Information Technology
You might also like to view...
A database _____________is organized into rows and columns.
a. grid b. matrix c. table d. spreadsheet
Computer Science & Information Technology
Which area of the Resource Monitor is used to monitor disk performance and determine whether the disk subsystem is a bottleneck?
A. CPU B. Disk C. Network D. Memory
Computer Science & Information Technology