1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
AVprozaik [17]
3 years ago
12

What can be done in order to secure a WLAN/wireless access point?

Computers and Technology
1 answer:
polet [3.4K]3 years ago
4 0

Answer:

this may help "Change default passwords. ...

Restrict access. ...

Encrypt the data on your network. ...

Protect your Service Set Identifier (SSID). ...

Install a firewall. ...

Maintain antivirus software. ...

Use file sharing with caution. ...

Keep your access point software patched and up to date."

Explanation:

You might be interested in
Why do we need to measure the amperage of an electric current?​
Sonbull [250]

Answer:

Explanation:It is very important to have a way to measure and quantity the flow of electrical current. When current flow is controlled

It can be used to do useful work. The flow of current is measured in pampered. The term amps is often used for short.

5 0
3 years ago
There’s No Difference In Security If You Use A Public PC Or Your Own Computer.
Andreas93 [3]
False because if you use public someone else could be using it as a a trap to get your information and with your own if you no how to use it well you will be safe


3 0
4 years ago
Which of the following statements applies to a proprietary software license? a. Purchased from a vendor and gives you the right
Semmy [17]

Answer: a)Purchased from a vendor and gives you the right to use the software but is not yours to own.

Explanation: Proprietary software is the software that can be used by the user but it has  copyright of the vendor/holder in any case.There are some certain condition under which the user can use this software.The distribution of the software is not permitted in this case. No modification or manipulation can be done by the user.

Other options are incorrect because it is not free as its purchased from vendor ,not freely available rather guided by owner and can be used over certain period of time.Thus , the correct option is option(a).

3 0
3 years ago
How many different Microsoft Windows file types can be infected with a virus?
vagabundo [1.1K]
Phishing, scam, Fraud, just to get to hack your computer.
6 0
3 years ago
Which search strategy explores nodes from the initial state as well as the goal state?
Simora [160]
Pretty sure it’s c! I’m not 100% tho sorry if I’m wrong have a nice day:)
5 0
3 years ago
Read 2 more answers
Other questions:
  • When you right-click a spreadsheet object, what command should you select to activate the sheet?
    6·2 answers
  • How to set up a paper format in any type of Microsoft version ????
    11·1 answer
  • Consider the following list.
    5·1 answer
  • Multisensory input/output devices, such as data gloves or jumpsuits, are commonly used with _______________ systems.
    12·1 answer
  • Memory, as a general construct, is best defined as A) the ability to briefly retain information in the senses. B) the long-term
    12·2 answers
  • I need it ASAP, brainliest to whoever answers correctly!
    10·1 answer
  • Calculate the data rate capacity for a 2400 baud signal where there are M=8 levels per symbol. a. 2400 bps b. 4800 bps c. 7200 b
    12·1 answer
  • Submitting a cover letter and resume is a step in the process of applying for a job.
    14·1 answer
  • The part of the screen where you see the results of your code is called the Editor.
    15·2 answers
  • The letters G, H, T, Y, B, and N are what type of keys?
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!