A company needs to implement a secure wireless system that would require employees to authenticate to the wireless network with their domain username and password. Which of the following would a network administrator deploy to implement these requirements? (Select TWO).

A. 802.1q
B. MAC address filtering
C. WPA2 Personal
D. WPA Enterprise
E. 802.1x

Answer:
D. WPA Enterprise
E. 802.1x

Computer Science & Information Technology

You might also like to view...

Because ________files are typically very large, when you create a presentation, you may want to link to the media by inserting a hyperlink to the resources website

A) text B) picture C) video D) audio

Computer Science & Information Technology

What is the complexity of a selection sort?

A. O(n2) B. O(n) C. O(log2n) D. O2

Computer Science & Information Technology