Which of the following should the network administrator implement on the WAP?

A network administrator is implementing a wireless honeypot to detect wireless breach attempts.
The honeypot must implement weak encryption to lure malicious users into easily breaking into the
network. Which of the following should the network administrator implement on the WAP?

A network administrator is implementing a wireless honeypot to detect wireless breach attempts.
The honeypot must implement weak encryption to lure malicious users into easily breaking into the
network. Which of the following should the network administrator implement on the WAP?

A.
WPA

B.
WPA2

C.
WEP

D.
VPN



Leave a Reply 0

Your email address will not be published. Required fields are marked *