FUNDAMENTALS OF COMPUTER

TROUBLESHOOTING COMPUTER ISSUES

IDENTIFYING HARDWARE SOFTWARE NETWORK PROBLEMS

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Which of the following should be used to restrict access to a wireless network? (KLO 3.2, unit 28)
A
Port forwarding
B
Enable SSID broadcast
C
Wireless encryption
D
Enable DMZ
Explanation: 
There is 1 question to complete.