1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
valentinak56 [21]
2 years ago
13

you need to configure a wireless network using wpa2-enterprise. which of the following components should be part of your design?

(select two.)
Computers and Technology
1 answer:
Iteru [2.4K]2 years ago
4 0

Answer: AES encryption

802.1x

Explanation:

You might be interested in
If a linux installation ends abnormally and the screen displays a fatal signal 11 error, what type of error has occurred?
artcher [175]
The installation would have crashed or failed
6 0
4 years ago
If you give someone ______ to your device, they can control it through another phone or computer.
icang [17]

If you give someone <u>Remote access </u>to your device, they can control it through another phone or computer.

<h3>What is  Remote entry?</h3>

An authorized user can use remote access to connect to a computer or network from a different location using a network connection. Users can connect to the systems they require through remote access even if they are physically far away.

Therefore, the dangers to remote access are:

  • There is a risk of device loss or theft due to a lack of physical security safeguards.
  • as the data is transmitted through a public internet, eavesdropping.
  • unapproved access to systems or data, possibly while oblivious to the screen.
  • If someone gets access to the gadget, they could watch and change the data.

Learn more about Remote access from

brainly.com/question/28900477
#SPJ1

5 0
1 year ago
897,100 rounded to the nearest hundred thousand is
dmitriy555 [2]

The answer would be 900,100 because the hundred thousand is the 8 and since the number next to the 8 is a nine, the 8 is rounded up

7 0
3 years ago
What is it called when two different files generate the same hashing result?
IrinaK [193]
A Hash<span> Collision Attack is an attempt to find </span>two<span> input strings of a </span>hash<span> function that </span>produce the same hash result<span>. ... If </span>two separate<span> inputs </span>produce the same hash<span> output, it is </span>called<span> a collision. </span>
4 0
3 years ago
1. Write the full forms of the following.
motikmotik

Answer:

  1. Language of Graphic Oriented
  2. Initial Public Offering
  3. Control Unit
  4. Central Processing Unit

  • False
  • True
  • False
  • True

  1. Versatility
  2. Smartphone
  3. All of the above
6 0
3 years ago
Read 2 more answers
Other questions:
  • What makes sqlite an appropriate choice for an android application, compared to other relational database management systems, su
    15·1 answer
  • You have a large company, and it is important to your business that your employees' work is backed up regularly. Which network w
    7·2 answers
  • Given that it takes 0.08 ms to travel from one track to the next of a hard drive; that the arm is originally positioned at Track
    6·1 answer
  • When the speaker compares dream memories to fall leaves that are hard to catch,what feeling does the simile suggest?
    14·2 answers
  • Suppose a retailer who has no technology expertise wishes to set up an online presence for his business. He ________. a. ​can us
    6·1 answer
  • What should you wear during lab investigations to protect your eyes?
    5·1 answer
  • The status bar only lets you view the current X, Y and Z coordinates of the cursor. Select one: True False
    8·2 answers
  • Write a python program to print the square of all numbers from 0 to 10.
    15·2 answers
  • PLEASE HELP URGENT!!
    5·2 answers
  • Execute and explain this program using // in Layman's language. Thank you!
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!