Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


How do you protect your home Wireless Access Point?



How do you protect your home Wireless Access Point?..

Answer / chaitanya

 There are a lot of different ways to protect a Wireless Access Point: using WPA2, not broadcasting the SSID, and using MAC address filtering are the most popular among them. There are many other options, but in a typical home environment, those three are the biggest.

Is This Answer Correct ?    0 Yes 0 No

Post New Answer

More Computer Security Interview Questions

What is a spooler on a computer?

0 Answers  


 Why is deleted data not truly gone when you delete it?

1 Answers  


Is a console a computer?

0 Answers  


How would you login to Active Directory from a Linux or Mac box?

0 Answers  


A phonetic password generator picks two segments randomly for each six-letter password. The form of each segment is CVC (consonant, vowel, consonant), where V= < a, e, i, o, u > and C = (V.) ̅ What is the total password population? What is the probability of an adversary guessing a password correctly?

0 Answers  


What is SSL and why is it not enough when it comes to encryption?

1 Answers  


 What is the Chain of Custody?

1 Answers  


 Why would you want to use SSH from a Windows pc?

1 Answers  


What is data protection in transit vs data protection at rest?

1 Answers  


What is the Three-way handshake? How can it be used to create a DOS attack?

1 Answers  


What is meant by computer application?

0 Answers  


How many security protocols available?

1 Answers  


Categories
  • Computer Security Interview Questions Computer Security (58)
  • Mobile Security Interview Questions Mobile Security (9)
  • Hacking Interview Questions Hacking (33)
  • Security AllOther Interview Questions Security AllOther (4)