A company needs to implement a secure wireless system that would require employees to authenticate to the wireless network with their domain username and password. Which of the following would a network administrator deploy to implement these requirements? (Select TWO).
A. 802.1q
B. MAC address filtering
C. WPA2 Personal
D. WPA Enterprise
E. 802.1x
Answer:
D. WPA Enterprise
E. 802.1x
Computer Science & Information Technology
You might also like to view...
Because ________files are typically very large, when you create a presentation, you may want to link to the media by inserting a hyperlink to the resources website
A) text B) picture C) video D) audio
Computer Science & Information Technology
What is the complexity of a selection sort?
A. O(n2) B. O(n) C. O(log2n) D. O2
Computer Science & Information Technology