Which of the following topologies would cause the network to be segmented if any one machine went offline?
Which of the following encryption methods is considered easily broken and should be avoided when configuring wireless security?