A technician is configuring a wireless router for a small office and the business owner would like the wireless network to be secured using the strongest encryption possible. Which of the following should the technician choose?
A user’s laptop hard drive contains sensitive information. The user often plugs the laptop into the corporate network. A sensitive file from the laptop has been found on another user’s laptop. How could the user have prevented this breach?
Joe, a user, needs to store a large amount of data, but does not have enough space on his local computer. Which of the following are the BEST options for him to use? (Select TWO).
When connecting a printer to a network, which of the following is needed to complete the process? (Select TWO).
Which of the following protocols is used to secure communications between sender and receiver?
Which of the following extensions identifies a video file?