Which of the following are items that can be configured on a wireless router to make it more difficult for attackers to gain access? (Select TWO).

A. Change the wireless channel
B. Disable SSID broadcast
C. Change SSID from default
D. Enable DES encryption
E. Turn on port forwarding

Answer:
B. Disable SSID broadcast
C. Change SSID from default

Computer Science & Information Technology

You might also like to view...

A user reports that a file used yesterday is missing. The technician asks the user to show where the file was located. The technician then asks the user to show the attributes of the folder where the file was stored and sees that the folder allows files to be saved and changed in the folder. The technician also asks the user to use the Previous Versions tab and sees that the folder was modified

yesterday. Which step of the troubleshooting process should the technician perform next? A) Establish a theory of probable cause. B) Test a theory to determine the cause. C) Identify the problem. D) Establish a plan of action.

Computer Science & Information Technology

An alternative to password protection is Android's pattern recognition tool.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology