1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
maw [93]
3 years ago
15

You are configuring a wireless network with two wireless access points. Both access points connect to the same wired network. Yo

u want wireless users to be able to connect to either access point and have the ability to roam between the two access points. How should you configure the access points?
a. Different SSID, different channel
b. Same SSID, different channel
c. Different SSID, same channel
d. Same SSID, same channel
Computers and Technology
1 answer:
-BARSIC- [3]3 years ago
7 0

Answer:

b. Same SSID, different channel

Explanation:

The Service Set Identifier (SSID) is a sequence that is included in all of the sets in a wirless network and helps identify them as part of the network. Because both points connec to the same network they need the same SSID.

You might be interested in
How do I answer a question that was answered incorrectly on Brainly
Mashcka [7]

Answer:

Explanation:

Go and ask a teacher or search

6 0
3 years ago
Read 2 more answers
A security team has downloaded a public database of the largest collection of password dumps on the Internet. This collection co
Scorpion4ik [409]

Answer:

a. Password length, password encryption, password complexity

Explanation:

Under this scenario, the best combination would be Password length, password encryption, password complexity. This is because the main security problem is with the user's passwords. Increasing the password length and password complexity makes it nearly impossible for individuals to simply guess the password and gain access, while also making it extremely difficult and time consuming for hackers to use software to discover the password as well. Password excryption would be an extra layer of security as it encrypts the password before storing it into the database, therefore preventing eavesdroppers from seeing the password and leaked info from being used without decryption.

4 0
3 years ago
Write a python program that prints the multiplication table of 9 ?​
ololo11 [35]
X = int(input(“Enter a number”))
table = x * 9
print table

#For the number inputed it will output that number multiplied by 9
7 0
3 years ago
Read 2 more answers
Jim has just purchased two new SCSI hard disk drives and a controller card for them. He properly installs the hardware in his ma
yawa3891 [41]

Answer:

  • Create partitions on each hard disk drives.
  • Mount the partition created on each hard drive so they are accessible by the the operating system.
  • Format the partitions created with a filesystem recognized by Linux.

Explanation:

Having purchased the two new SCSI hard disk drives with the controller cards for each and installed them properly, before using them for data storage and retrieval he must first use the fdisk command to create one or more partitions on each of the hard disk drives then mount any partitions created on the two hard drives so that they are accessible by the operating system before then proceeding to format any partitions created with a valid filesystem recognized by Linux.

4 0
3 years ago
What two characteristics describe an ftp connection?.
Brrunno [24]
The first connection established is for traffic control and the second is created for transfer of a file.

Please mark as brainlest answers
5 0
3 years ago
Other questions:
  • The component that allows you to make a paper-based copy of a body of text is the _____.
    12·1 answer
  • ____ are the computers that store network software and shared or private user files.
    6·1 answer
  • How will you create an email id
    11·1 answer
  • Your network has had long power outages that have caused Hyper-V servers to shut down after the UPS battery is drained. When pow
    8·1 answer
  • _________ is critical to Amazon's success.<br><br> SCM<br><br> JIT<br><br> ERP<br><br> VMI
    9·1 answer
  • If you copy and paste from someone else's document (such as a website, a friend's paper, an instructor's solutions manual, etc.)
    15·1 answer
  • What is the primary means by which attackers infect computers with these attacks? How do these attacks commonly occur?
    8·1 answer
  • Qwertyuiopasdfghjklzxcvbnm??
    14·2 answers
  • How is the architecture converted into software code? Elaborate the steps its passes through with help of examples / Diagram.
    15·1 answer
  • Firestick optimizing system storage and applications
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!