List five steps that can be used to protect a home network.
What will be an ideal response?
1. Change the default factory passwords.
2. Change the default SSID.
3. Turn on encryption.
4. Turn off the SSID broadcast.
5. Enable MAC address filtering.
Computer Science & Information Technology
You might also like to view...
Using ________ can give text a banner-like appearance in a worksheet
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
The first task in the installation process is ____________________ files.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology