Which of the following are items that can be configured on a wireless router to make it more difficult for attackers to gain access? (Select TWO).
A. Change the wireless channel
B. Disable SSID broadcast
C. Change SSID from default
D. Enable DES encryption
E. Turn on port forwarding
Answer:
B. Disable SSID broadcast
C. Change SSID from default
You might also like to view...
A user reports that a file used yesterday is missing. The technician asks the user to show where the file was located. The technician then asks the user to show the attributes of the folder where the file was stored and sees that the folder allows files to be saved and changed in the folder. The technician also asks the user to use the Previous Versions tab and sees that the folder was modified
yesterday. Which step of the troubleshooting process should the technician perform next? A) Establish a theory of probable cause. B) Test a theory to determine the cause. C) Identify the problem. D) Establish a plan of action.
An alternative to password protection is Android's pattern recognition tool.
Answer the following statement true (T) or false (F)