Which of the following techniques are used to secure wireless networks?

Posted by: Pdfprep Category: GISP Tags: , ,

Which of the following techniques are used to secure wireless networks?

Each correct answer represents a complete solution. Choose three.
A . MAC address filtering
B . SSID spoofing
C . IP spoofing
D . Closed network

Answer: A,B,D

Leave a Reply

Your email address will not be published.