Question

You have a customer who is interested in having you install a wireless network in his...

You have a customer who is interested in having you install a wireless network in his home, but he is concerned about his neighbors wirelessly using his network to access the Internet. He asks you for a list of security measures he can apply to his wireless network to prevent it from being used by his neighbors. What methods do you mention? (Choose three.)

A. WEP

B. WPA

C. Disable SSID broadcasts

D. MAC filtering

0 0
Add a comment Improve this question Transcribed image text
Answer #1

B, C, and D. The SSID, or Service Set Identifier, is the name of the wireless network, and the SSID name is broadcast by default from wireless access points and routers, letting anyone with wireless capacity within range see your network. Disabling SSID broadcasts makes your network “invisible” to your neighbors, so a security breach will be much less likely. WPA, or Wi-Fi Protected Access, was designed to replace WEP by using TKIP, the Temporal Key Integrity Protocol. MAC address filtering allows you to define a list of MAC addresses, which are the physical addresses of network cards, which you either accept or reject on the network. If you enter a list of the MAC addresses for the computers in your household on the wireless router or broadband modem, only computers with those physical addresses will be able to connect. All others will be rejected.

Add a comment
Know the answer?
Add Answer to:
You have a customer who is interested in having you install a wireless network in his...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Question 2 (20 marks) – Improving network design Jim is impressed by your report and asks you to write a proposal to improve the network, although his budget is limited he tells you that if you can j...

    Question 2 (20 marks) – Improving network design Jim is impressed by your report and asks you to write a proposal to improve the network, although his budget is limited he tells you that if you can justify your design choices you may be able to purchase some more equipment. You will need to provide a new network design diagram in PowerPoint format, thankfully Jim has included a couple of slides with various network equipment elements that you can use...

  • HOMEWORK 4

    Each (1-13) question is 5 points: 1.      How many bits are in a MAC address?2.       3.      How many bits are in an IPv4 IP address? 4.      When using DSL modem to connect to the Internet, the data transmission shares the cabling with what other technology? 5.      Which type of networking cable is more reliable, STP or UTP? Which is used more on LANs? 6.      Which TCP/IP protocol that manages packet delivery guarantees that delivery? Which protocol does not guarantee delivery, but is faster? 7.      Which...

  • ***I only need the High Level Project Plan (Time to Implement)****** You have recently been hired...

    ***I only need the High Level Project Plan (Time to Implement)****** You have recently been hired by a new Japanese accounting firm, headquarter in Tokyo, as the director ofInformation Systems and Telecommunications. Your assignment is to assist security posture of the firm anddevelop a security structure for this new company. Write your recommendations and reasons to the firm’s CEO. The firm has 600 employees in Tokyo, 50 in Houston, and is planning to open two branch offices in India andCalifornia....

  • TASK Read the Regional gardens case study document before attempting this assignment. Background: You have been...

    TASK Read the Regional gardens case study document before attempting this assignment. Background: You have been employed by Regional Gardens as their first Chief Information Officer (CIO). You have been tasked by the Board to conduct a review of the company’s risks and start to deploy security policies to protect their data and resources. You are concerned that the company has no existing contingency plans in case of a disaster. The Board indicated that some of their basic requirements for...

  • First, read the article on "The Delphi Method for Graduate Research." ------ Article is posted below...

    First, read the article on "The Delphi Method for Graduate Research." ------ Article is posted below Include each of the following in your answer (if applicable – explain in a paragraph) Research problem: what do you want to solve using Delphi? Sample: who will participate and why? (answer in 5 -10 sentences) Round one questionnaire: include 5 hypothetical questions you would like to ask Discuss: what are possible outcomes of the findings from your study? Hint: this is the conclusion....

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT