A technician has been given the task to install a wireless network in a user's home. Which of the following should the technician consider when implementing the network? (Select TWO).
A. That there is strong encryption enabled and configured on the access point.
B. The user's home network has a correctly completed WHOIS entry.
C. The access point is broadcasting the SSID based upon manufacturer's standards.
D. There are no conflicts of channels in use by neighboring wireless networks.
E. There are redundant internal DNS names set in the access point's settings.
F. That the access point's MAC address is properly set in its configuration settings.
Answer:
A. That there is strong encryption enabled and configured on the access point.
D. There are no conflicts of channels in use by neighboring wireless networks.
You might also like to view...
A_______ is a digital document used to identify a user and issued by a certificate authority (CA).
a) digital signature. b) digital certificate. c) key. d) None of the above.
The technique of implementing each stack method as a call to a List method is called __________.
a. delegation. b. delimiting. c. assigning. d. shifting responsibility.