Which wireless local-area network (WLAN) device is often used to make wireless connections between buildings or campuses?
Which network security strategy element refers to implementing barriers that serve as both physical and virtual protections against possible threats?
What are two software-based attacks that disable individual workstations and typically spread from user to user by e-mail? (Choose two