You are concerned about attackers simply passing by your office, discovering your wireless network, and getting into your network via the wireless connection. Which of the following are NOT steps in securing your wireless connection?
Each correct answer represents a complete solution. Choose two.
Shenika
4 months agoOna
4 months agoChantell
4 months agoJulio
4 months agoCeleste
5 months agoRodolfo
5 months agoAudria
5 months agoAlishia
5 months agoEmmett
5 months agoHuey
5 months agoAlba
5 months agoTomas
5 months agoNickolas
5 months agoLashandra
5 months agoRima
5 months agoJovita
5 months agoTomoko
5 months ago