List five steps that can be used to protect a home network.

What will be an ideal response?

1. Change the default factory passwords.
2. Change the default SSID.
3. Turn on encryption.
4. Turn off the SSID broadcast.
5. Enable MAC address filtering.

Computer Science & Information Technology

You might also like to view...

Using ________ can give text a banner-like appearance in a worksheet

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The first task in the installation process is ____________________ files. 

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology