A technician is implementing a new wireless network for an organization. The technician should be concerned with all of the following wireless vulnerabilities EXCEPT:
A.
rogue access points.
B.
80211 mode.
C.
weak encryption.
D.
SSID broadcasts.
A technician is implementing a new wireless network for an organization. The technician should be concerned with all of the following wireless vulnerabilities EXCEPT:
A technician is implementing a new wireless network for an organization. The technician should be concerned with all of the following wireless vulnerabilities EXCEPT:
A.
rogue access points.
B.
80211 mode.
C.
weak encryption.
D.
SSID broadcasts.