Which of the following would an administrator apply to mobile devices to BEST ensure the confidentiality of data?
Which of the following wireless security controls can be easily and quickly circumvented using only a network sniffer? (Select TWO).