A network administrator is implementing a wireless honeypot to detect wireless breach attempts. The honeypot must implement weak encryption to lure malicious users into easily breaking into the network. Which of the following should the network administrator implement on the WAP?

A. WPA
B. WPA2
C. WEP
D. VPN

Answer: C. WEP

Computer Science & Information Technology

You might also like to view...

You are repairing a computer that has been used in warehouse for several years. You suspect a problem with a memory module. What should you do first?

a. Replace the module with a new one. b. Install more RAM. c. Clean the RAM slot. d. Install RAM heat sinks.

Computer Science & Information Technology

Answer the following statements true (T) or false (F)

1. Subproblems that a recursive search solution generates need not reach a base case. 2. You can use induction to prove that a recursive algorithm either is correct or performs a certain amount of work. 3. Little relationship exists between mathematical induction and recursion.

Computer Science & Information Technology