Which of the following security methods is used to attract users attempting to gain unauthorized access to various systems within a single network?
Which of the following options would allow the network administrator to ensure the WAP is deployed correctly?