1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
AVprozaik [17]
3 years ago
12

What can be done in order to secure a WLAN/wireless access point?

Computers and Technology
1 answer:
polet [3.4K]3 years ago
4 0

Answer:

this may help "Change default passwords. ...

Restrict access. ...

Encrypt the data on your network. ...

Protect your Service Set Identifier (SSID). ...

Install a firewall. ...

Maintain antivirus software. ...

Use file sharing with caution. ...

Keep your access point software patched and up to date."

Explanation:

You might be interested in
Electricity was seen as a mysterious force and began to creat a stir when people called​
atroni [7]

This isn't related to computers and when you look it up all it comes up with a Stars Wars.

3 0
4 years ago
A router has just received the following new IP addresses: 88.62.108.0/21, 88.62.116.0/21, 88.62.120.0/21 and 88.62.128.0/21. If
Natali [406]

Answer:

Yes, they can be aggregated into a single network address of 88.62.0.0/16

Explanation:

Since they all will be using the same outgoing interface so they can be grouped according to next hop which appears to be the same for all four IP address.

First convert all the network addresses into binary.

DECIMAL                      BINARY                                                      CLASS OF IP

88.62.108.0/21            01011000.00111110.01101100.00000000      Class A

88.62.116.0/21             01011000.00111110.01110100.00000000     Class A

88.62.120.0/21            01011000.00111110.01111000.00000000     Class A

88.62.128.0/21           01011000.00111110.10000000.00000000    class A

Looking at the binary form of the address from left to right it can be observed that all for address are identical in the first two octet, that is up to the 16th digit.

So the new subnet mask will be /16, using any of the four address and the /16 mask will can obtain the new network address

All four address can be summarized as 88.62.0.0/16

4 0
3 years ago
Which of the following can you use to judge source legitimacy?
Sholpan [36]

Answer:

The answer is A

Explanation:

To judge a sources legitimacy is to find factual evidence on a page. Does the page use sources as well? Does the source come from a domain such as: .edu .gov etc.? Does the author show non opinions? If the answer to these questions is yes then your credible resource is accurate.

3 0
3 years ago
Read 2 more answers
What is the new file system available in windows server 2012?
exis [7]
Windows 2012 introduced a proprietary File system to success NTFS with ReSF (Resilient File System). There are many improvements made over NTFS as larger disks sizes, better quota management, additional attributes etc. also, the speed has significantly increased. There are many more improvement that you can simply Google.
6 0
4 years ago
How to generate random numbers in excel without duplicates
Lilit [14]

Answer:

<h3>Generate Random Number List With No Duplicates in Excel:</h3>

1. Select cell B3 and click on it.

2. Insert the formula: =RANDBETWEEN(10,30)

3. Press enter.

4. Drag the formula down to the other cells in the column by clicking and dragging the little “+” icon at the bottom-right of the cell.

Explanation:

Hope it helps you..

Your welcome in advance..

(ㆁωㆁ)

5 0
3 years ago
Other questions:
  • A computer that stores and distributes newsgroup messages is called a newsreader.
    13·1 answer
  • The ? Tool removes blemishes and imperfections by sampling pixels around the spot and then paints withh matching texture, transp
    10·1 answer
  • Under the Right to Know Rule, employers need to include information on which one of the following in a written and complete haza
    5·1 answer
  • (Game Design) Which of the following is NOT a name of a popular digital sculpting application?
    13·1 answer
  • Difference between switch case and if else statement.​
    11·1 answer
  • Which best describes the benefits of renting a home
    12·2 answers
  • Information is data converted into useful, meaningful context. What are data characteristics that change or vary over time?
    8·1 answer
  • What is the function of the &lt; !Doctype &gt; tag?
    12·2 answers
  • Mô tả những lợi ích của việc sử dụng đa xử lý không đồng nhất trong một hệ thống di động
    8·1 answer
  • What adaptation Judy and her parents have that help them run from predators coming?​
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!