220-1002 Exam Question 36

A small business has an open wireless network so vendors can connect to the network without logging in.
The business owners are concerned that a nearby company is connecting and using the wireless connection without permission. If the small business requires that the network remain open, which of the following configuration settings should be changed to address these concerns?
  • 220-1002 Exam Question 37

    Which of the following accurately describes why a file on a USB drive would be inaccessible by a user until the correct authentication is received?
  • 220-1002 Exam Question 38

    Which of the following social engineering vulnerabilities occurs when someone follows a technician into a server room without using a key card?
  • 220-1002 Exam Question 39

    Which of the following is the MOST secure wireless security protocol?
  • 220-1002 Exam Question 40

    A Windows user is trying to print a large number of documents to a network printer, but the printer is no longer printing. A technician investigates and notices all the jobs are stuck in the print queue. Which of the following should the technician perform to resolve the issue?