Your company has a wireless network for its small office network. The wireless network does not broadcast its service set identifier (SSID). You configure a user's Windows Vista computer to connect to the wireless network by manually setting the SSID. You need to ensure that the user's computer does not send probe requests to discover if the wireless network is in range. What should you do?

Answers

Answer 1

Answer:

make sure that the "Connect even if the network is not broadcasting" is cleared

Explanation:

Based on the information provided within the question it can be said that in order to ensure this you should make sure that the "Connect even if the network is not broadcasting" is cleared. Otherwise this option will send probe requests in order to discover if a non-broadcasting network is in range. Therefore by clearing this option no probe requests will be sent.


Related Questions

1) These are operators that add and subtract one from their operands. A) plus and minusB) ++ and --C) binary and unaryD) conditional and relationalE) None of theseAnswer: 2) What is the output of the following code segment?n = 1; while (n <= 5) cout << n << ' '; n++; A) 1 2 3 4 5B) 1 1 1... and on foreverC) 2 3 4 5 6D) 1 2 3 4E) 2 3 4 5Answer: 3) This operator increments the valu

Answers

Answer:

1) B: ++ and --

2) B: 111... and on forever

Explanation:

++ and -- in most programming languages are used for incrementing(adding) by 1 or decrementing(substracting) by 1.

The code will output 111... and on forever because the while loop was not covered in curly braces.

Which routing protocol does an exterior router use to collect data to build its routing tables?
A. OSPFB. IPC. RIPv2D. BGP

Answers

Answer:

D. BGP

Explanation:

In order to exchange routing information with another AS (Autonomous Systems) only, exterior routers use an exterior routing protocol, like BGP (Border Gateway Protocol) or EGP (Exterior Routing Protocol).

BGP is an application-layer protocol in the TCP/IP suite, that uses a well-known TCP port (179) in order to deliver information reliably.

It is important to note that in order to exchange routing data within his own AS, the router uses an interior routing protocol, like OSPF.

Your wireless network has been breached and it seems as though the attacker has modified a portion of your data that is used with a stream cipher. This was used to expose wirelessly-encrypted data. What type of attack is this?

Answers

Answer: IV attack

Explanation:

 IV attack is stand for the initialization vector attack that are used over the wireless network an it is used as the encrypted packet during the process of transmission. An initialization vector attack basically attempts for exploits for exposing the encrypted information.

 According to the question, the IV attack is basically used with the stream cipher for exposing the information wirelessly.

The initialization vector is one of the arbitrary number that are used in the for  of secret key in the system and it helps in prevent the duplicate character in ciperhtext.

 Therefore, IV attack is the correct answer.

. What does it mean when a school bus is stopped with its red signal lights flashing? A. Children are loading or unloading and you must stop and wait for the lights to stop flashing before you move B. Children are loading or unloading and you must slow down and pass carefully C. Children are loading or unloading and you must make a complete stop and pass carefully D. Children are loading or unloading and you must look out for pedestrians as you continue on your way

Answers

Answer: A. Children are loading or unloading and you must stop and wait for the lights to stop flashing before you move.

Explanation: This is a major safety Management in the roads,managed by The National Highway Traffic Safety Administration (NHTSA) of the United States Department of transportation, its mission is to Save lives, prevent injuries, reduce vehicle-related crashes. NHTSA was established December 31,1970.

Once a school bus is stopped with its red signal flashing all vehicles must stop pending the Loading or unloading of the school children is completed and the flashing red signal stopped.

Answer:

A. Children are loading or unloading and you must stop and wait for the lights to stop flashing before you move.

Outside a​ home, there is a 5​-key keypad with letters Upper A comma Upper B comma Upper C comma Upper D and comma Upper E that can be used to open the garage if the correct five​-letter code is entered. Each key may be used only once. How many codes are​ possible?

Answers

Answer:

120

Explanation:

5*4*3*2*1

If Windows does not automatically detect a newly added device, to get the device recognized and the drivers installed, you should _________.

Answers

Answer:

Update the device driver

Explanation:

Devices drivers are softwares used to link a component of the computer to the operating system functionality.

It normally comes with the installed operating system, but most plug and play devices , come with a little built-in OS that runs once it is plugged in.

If a device is not recognized, update the driver software and restart the system.

To get Windows to recognize a newly added device, manually run the Add Hardware Wizard from the Control Panel, use Device Manager to install drivers, or download drivers from the manufacturer's website.

If Windows does not automatically detect a newly added device, to get the device recognized and the drivers installed, you should manually run the Add Hardware Wizard in Windows. Access the wizard from the Control Panel under Hardware and Sound, or search for it in the Start menu.

Follow the prompts to install the device drivers which can also be found through the Device Manager. It may be necessary to download and install drivers from the manufacturer's website if Windows does not have the appropriate drivers.

You're responsible for technical support at a High School. You're concerned about students with some technical knowledge reconfiguring machines, either maliciously or not. You have already made sure Windows is secure and the students' login has the minimum necessary privileges. What else should you do to prevent students from re-configuring the school lab computers?

Answers

Answer:

setup a password for the BIOS

Explanation:

The BIOS refers to Basic Input/Output System. When a BIOS password is set, it will enforce autentication  whenever an attempt is made to login at startup. Remember that the computer's microprocessor uses the BIOS to bootup, and it is also responsible for managing information flow between the OS and other devices, therefore very sensitive settings are maintained here, setting up a password will further ensure that that students do not intentionally recomfigure the computers in the school laboratory.

Laura manages DLP for a large company where some employees have COPE and some have BYOD. What DLP issue could these devices present?

Answers

Answer:

For the COPE device, there won't be a lot of risks, because this type of model is very secure and trustworthy. The device belongs to the company and only the corporative use is allowed. The company owns maximum control on the information managed by the device. Some Blackberry devices were only COPE designed.

For the BYOD device, is the opposite, because this type of model is very unsecure since it doesn't count with the security barriers like the COPE model does, leading to the user losing critical information or getting hacked by installing malware. Even though it is a cheaper alternative for a lot of companies, it's far away from beign the most recommendable in terms of security, productivity and privacy.

Hamish has created a website with an online booking system for his salon appointments. He wants to engage more with his customers and came up a list of goals. Help Hamish to match each task with the online tool you think he should use to achieve his goal.

Answers

Answer:

Gather customer feedback: Email SurveyTell customers about the extended opening hours: Social Media PageShow customers Hamish’s latest hair looks: An online galleryHelp customers find the new salon: A map

Explanation:

1. By sending a questionnaire or survey via email, Hamish can gather customer feedback. Customers can answer these questionnaires directly in attached questions. They can also give feedback over email. Email survery is an economical way to collect feedback and can be sent to a many customers at the same time.

2. Hamish can tell customers about opening hours by a Social Media Page is a mean to assist social media accounts through QR Codes. He can update with his salon information via this web page. When customers scan can see salon's logo, information etc on this page in order to follow.

3. Hamish can display his latest hair looks through an online gallery by sharing his photos to many people. These images are stored, organized  displayed and shared on the website (online gallery). This is a better option than using expensive albums and hard copies.

4. Hamish can help customers to find a new salon by providing a map on his website. This makes easier for customers to locate the new salon as map provides with the navigation information. Customers can get a route  from their current location to the salon.

The online tools that Hamish should use to engage more with his customers are;

Map: for directionsEmail: exchange information

What are online tools?

Online tools are tools such as email, social media handle that can help one business to move forward and gain potential customers.

In the case above, Hamish can use email to exchange information with his clients about his products.

Learn more Online tools at;

https://brainly.com/question/24749457

help me please and thanks

Answers

Answer:

b

Explanation:

What are some types of vehicle technology advancements?
A. Navigation system
B. Dashboard of a car
C. Braking systems
D. All of the above

Answers

Answer:

D is the suitable answer.

Explanation:

All of the above

The incorporation of technical advancements into automobiles improves their value and utility for car owners, while also making them safer and more user-friendly. Thus, option D is correct.

What are the role of vehicle technology advancements?

In addition to the traditional safety measures like seatbelts and airbags, more recent innovations like automatic braking and front collision warning are now becoming standard.

Similar to how countless sensors, bells, and whistles assist us in maintaining the efficient operation of our machinery, cushions or heated seats assist us in traveling in comfort.

The actual application of knowledge about self-propelled machines or vehicles is known as automotive technology.

Therefore, Students majoring in automotive technology gain knowledge of a variety of topics, including engine design, fuel and ignition systems, drivetrains, brakes, and gearboxes, as well as electronic and diagnostic tools.

Learn more about vehicle technology here:

https://brainly.com/question/11314281

#SPJ5

Which of the following is incorrect? a. The operating cycle always is one year in duration. b. The operating cycle sometimes is longer than one year in duration. c. The operating cycle sometimes is shorter than one year in duration. d. The operating cycle is a concept applicable both to manufacturing and retailing enterprises.

Answers

Answer:

Explanation:

The operating system always is one year duration. If you don't believe me look it up. I am very good with computers.

Write a static method named printTwoDigit that accepts an integer n as a parameter and that prints a series of n randomly generated numbers. The method should use Math.random() to select numbers in the range of 10 to 19 inclusive where each number is equally likely to be chosen. After displaying each number that was produced, the method should indicate whether the number 13 was ever selected ("we saw a 13!") or not ("no 13 was seen."). You may assume that the value of n passed is at least 0.

Answers

Answer: Following code is in java language :-

import java.lang.Math;  

public class

{

   public static void main(String args[])

   {

       printTwoDigit(6);   //6 is the number of random numbers to be generated

   }

   public static void printTwoDigit(int n)

       {

           int i = 0;

           int arr[]=new int[n];  //will declare a array of n size

           int flag=0;

           while(i<n)

           {

               arr[i] = 10 + (int)(Math.random()*10);  //produce random number each time  

               System.out.println(arr[i]+" ");  //print all random numbers

               i++;  

           }

           for(i=0;i<n;i++)

           {

               if(arr[i]==13)  //to check if 13 was generated

               {

                   flag=1;

                   break;

               }

           }

           if(flag==1)

               System.out.println("we saw a 13");   //this line is mentioned in question

           else

               System.out.println("no 13 was seen");    //this line is mentioned in question

           

       }

}

OUTPUT :

15

11

15

19

13

19

we saw a 13

Explanation:

In the above code, an array is declared with size n(which is passed as an argument to the function) to store the list of all random number produced.Random() is multiplied by 10 so that it can produce a number 10 numbers starting from 0 and then 10 is added to the generated number so that minimum value generated would be 10.All numbers generated are printed to console n times and stored in arr.After that arr is checked for value 13 so it can print whether 13 was produced or not.

Final answer:

The printTwoDigit method generates n random numbers between 10 and 19 using Math.random(), checks if the number 13 appears, and prints a corresponding message.

Explanation:

The method printTwoDigit generates and prints a series of random numbers between 10 and 19, using the Math.random() function. To generate numbers specifically in the range of 10 to 19, we can multiply the result of Math.random() by 10 and then add 10 to shift the range. After generating each number, the method checks if the number 13 was generated and prints a message accordingly. If at least one instance of the number 13 appears during the sequence, the message "we saw a 13!" is displayed; otherwise, the message "no 13 was seen." is shown.

Here is an example implementation of the method:

public static void printTwoDigit(int n) {
   boolean saw13 = false;
   for(int i = 0; i < n; i++) {
       int randomNum = (int)(Math.random() * 10) + 10;
       System.out.print(randomNum + " ");
       if(randomNum == 13) {
           saw13 = true;
       }
   }
   System.out.println();
   if(saw13) {
       System.out.println("we saw a 13!");
   } else {
       System.out.println("no 13 was seen.");
   }
}

--------------------is a host that runs software to provide information, such as web content, to other hosts.

Answers

Answer:

Server is the correct answer for the above question.

Explanation:

The Network is an architecture which is used to connect one or more computer (host) to share the information or to do communication. There are two types of 'host' in this network--- one is server and the other is the client. The Server is used to provide the functionality to the clients whereas clients are used to taking the information from the server. The Server is a collection of larger database and software which have following functions--

It runs the software for the clients.It authenticates the clientsIt gives the information or answer to the question asked by the clients.

The above question statement asked about a device which is used to run the software for other host and provide information to other host and that is a server which is host computer connected in the network. Hence the server is the correct answer.

Which of the following IP address ranges is reserved for automatic private IP addressing?

Answers

Answer:

169.254.0.1 to 169.254.255.254

Explanation:

Automatic Private IP Addressing is a feature in windows computers that gives a computer the ability to assign itself an IP address in the situation that there is no DHCP (Dynamic host configuration protocol) to do the task. the above range of IP Address are the reserved addresses available to chose from when the need arises.

write a program that find all possible combination of picking 3 letters or numbers

Answers

Answer:

This is a MATLAB code.

clear all

clc

alphabet = 'abcdefghijklmnopqrstuvwxyz0123456789';

for i = 1:combntns(length(alphabet),3) %takes the combination of (36,3)

pick(1) = ceil(rand()*length(alphabet)); %randomly chooses a letter or number

alphabet(find(alphabet == pick(1))) = ''; %removes the chosen character from the list

pick(2) = ceil(rand()*length(alphabet)); %randomly chooses second letter or number

alphabet(find(alphabet == pick(2))) = ''; %removes the chosen character

pick(3) = ceil(rand()*length(alphabet)); %randomly chooses the third letter or number

result(i,:) = alphabet(pick); %saves the 3-character pick into an array

alphabet = 'abcdefghijklmnopqrstuvwxyz0123456789'; %restores the original list of letters and numbers

end

disp(result) %displays all the combinations

Explanation: Please read the comments on each line.

If Twitter were to exclusively use e-mail, collaborative computing, and other computer connections to connect geographically separate employees, it would be considered a(n) ______ organization.

Answers

Answer:

Virtual is the correct answer for the above question.

Explanation:

A Virtual organization is a collection which is used to connect the geographical people, organizational units, employees, individuals and groups for some communication purpose. Virtual means that there is some existence like physically but it is not physically present. So the organization also connects the person and gives the real scenario with the help of some software for communication.

The question states that if twitter uses email and other computing connections to connect people globally then it comes in the Virtual department because it follows the concept of the virtual department. Hence Virtual is the correct answer.

which command should you enter to configure a single port to discard inferior bpdus 200-125?

Answers

Answer:

spanning-tree portfast bpduguard

Explanation:

spanning- tree protocol (STP) is a layer 2 protocol in the OSI model. It is automatically configured in a switch to prevent continual looping of BPDUs, to avoid traffic congestion. The fastport bpduguard is only applicable in non-trunking access in a switch. It is more secure to configure the fastport mode in switch port connected directly to a node, because there are still bpdus transfer in a switch to switch connection.

BPDUs Guard ensures that inferior bpdus are blocked, allowing STP to shut an access port in this regard.

HOUSE HEARING, 109TH CONGRESS - THE INTERNET IN CHINA: ATOOL FOR FREEDOM OR SUPPRESSION?

Answers

Answer:

SUPPRESSION TOOL

Explanation:

In China there is not internet, in this Asian country exists the biggest intranet in the world, with a lot of government restrictions.

If we try to enter any occidental social media, we cannot because the Chinese government has these websites blocked even in cellphone apps.

Chinese people cannot talk bad about the government because they can go to the prison, China has their social media, nobody can say a bad comment about the government, in addition in China have a scoring system, if you have a bad score, you cannot get a job or a loan.

Computer maker Dell realized the problems with keeping large inventories, especially because of the fast rate of obsolescence of electronics components. Dell now keeps only about two hours of inventory in its factories. The company is most likely using a ________ system.

Answers

Answer:

what are you asking

Explanation:

In computer science, what are two names that are used to describe data structures organized by association

Answers

Answer:

Answer to the following question are,

Association list Tables

Explanation:

Because these are the two associations data structures.

Association List: are referred to that data type which contains the pair of the key and item in the Java Programming Language and Python Programming Language, it is called a dictionary data type.Tables or Hash Tables: are referred to that data type which converts the keys into the integer value.

Final answer:

In computer science, 'associative arrays' and 'maps' are two data structures organized by key-value associations, which enable efficient retrieval of data.

Explanation:

In computer science, two names that are often used to describe data structures organized by association are associative arrays and maps. An associative array (also known as a dictionary or a map) is a data structure that pairs unique keys with corresponding values.

This allows for efficient data retrieval based on those keys. Similarly, a map is a collection of key-value pairs where each key is unique and is used to store and retrieve data. Both associative arrays and maps are highly useful for situations where quick lookups of associated data are necessary.

"Select the computing device that uses a limited version of an operating system and uses a web browser with an integrated media player.

1. tablet
2. notebook
3. netbook
4. web-based "

Answers

Answer:

Web based

Explanation:

A python programmer is writing a function definition. What syntax should be used?

Answers

Answer:

Syntax of function in the Python Programming Language.

def function_name():

   '''body of the function or code'''

#calling of the function

function_name()

Note: In Python Programming Language, Indentation is sensitive if you not focus on the indentation then, you program occurs an indentation error.

Explanation:

In Python Programming language, we can use the "def" keyword to define a function then we write the name of the function and then use parentheses for the argument list. "#" is used for the single-line comment and " ''' ''' " is used for the multiple line comment.

A function is the part or module of the program which provides users the feature of reusability of that code anywhere only by calling them.

Answer:

def functionName( arguments ):

statement1

statement2

statement3

Explanation:

Adam is evaluating the security of a web server before it goes live. He believes that an issue in the code allows an SQL injection attack against the server. What term describes the issue that Adam discovered?

Answers

Answer:

Vulnerability

Explanation:

Vulnerability: In information security, Vulnerability is defined as a weakness or flaw in the system which leaves it wide open to attackers to gain sensitive/confidential information and cause severe damage to the organization.

What can happen?

If this weakness doesn’t get treated, then the SQL injection attack is most likely to happen which will result in sensitive database being stolen by the hackers. This can cause serious implications for any organization hence it very important to take such vulnerabilities very seriously and dealt accordingly.

Which formula is properly constructed

Answers

Answer:

Option 4 is correct ,=(B2+C9)

Explanation:

In excel a formula starts with an equal sign followed by the expression.

In first option the formula is incorrect inside the brackets. where 4 is equating to bracket. In 2nd option opening and closing brackets are not same. First closing bracket is missing an opening bracket. In third option all the formula is correct except the part where # is used in formula. Hash tags cannot be used in formula as a value. Here in option D  B2 and C9 are cell in excel, whereas parentheses are only used for better readability.

A disgruntled employee can harm a company by launching a computer virus, changing or deleting files, or exposing system passwords.

Answers

Answer:

Threat disgruntled employees

Explanation:

This is a type's threat in a network, why disgruntled employees is a threat?

Because disgruntled employees can implement a plant to damage a company's system when an IT employee be fired.

I t can be difficult to try to protect a system of these threats, Traditionally companies can wait for the less damage, then delete those credentials.

In cloud computing we have IDaaS, where an external company administers the company's credentials, is harder to damage the system in this way.

If an investigator finds a computer that is turned off during a search with a warrant, the investigator should:___________.

A. turn on the computer.
B. leave the computer turned off.
C. unplug the computer from the wall.
D. none of the above

Answers

Answer:

B. leave the computer turned off.

Explanation:

You decide to use a packet sniffer to identify the types of traffic being sent to a router. You run the packet sniffing software on a laptop computer which is connected to the same hub that is connected to the router. When you run the software, you only see frames addressed to your laptop and not frames addressed to other devices. Which feature should you configure on your laptop?

Answers

Answer:

Port Mirroring.

Explanation:

Port mirroring allows to send a copy of network packets seen on one port to a network monitoring connection on another port and hence you will be able to monitor frame addresses of other connected devices.

A company has a network address of 192.168.1.64 with a subnet mask of 255.255.255.192. The company wants to create two subnetworks that would contain 10 hosts and 18 hosts respectively. Which two networks would achieve that?

Answers

Answer:

192.168.1.96/28 and 192.168.1.64 /27

Explanation:

In computer networking, subnetting  is a way of sharing up a network into several more networks. It's importance includes improving routing effectiveness, enhancing security on the network and better managment control. subnetting is acheived by slicing IP address, in the case given in the question, Subnet 192.168.1.64 /27 with 5 bits allocated for the host  and  will only be able to hold 32 addresses,  Subnet 192.168.1.96/28 on the other hand has 4 bits for the host addresses and as such will be able to hold 16 addresses.

All of the following are U.S.-EU data privacy requirements except:
Select one:
a. Notice of purpose and use of data collected
b. Redundant hardware and data backup systems
c. Access for consumers to their information
d. Adequate security, data integrity, and enforcement provisions

Answers

Answer:

b. Redundant hardware and data backup systems

Explanation:

Data privacy is important where a company collects, processes and stores personal information.In the US-EU have laid down regulations to ensure data privacy is maintained. It is a requirement before collection of personal data, to clearly state why the data is being collected and how it will be used.The individuals whose data is being processed have a right to access their data at no cost during processing . Of great importance is the security of the data so as to maintain its integrity, Companies are required to take steps in protecting the data from unauthorized access, processing and accidental loss.redundant hardware and data backup system are used by companies as a fail-safe mechanism in data protection but they are not a requirement in data privacy, although they enhance it.

Other Questions
Which of the following is a win-win strategy? Group of answer choices a. Avoid arguments that might lead to anger and hurt feelings. b. Know what you are willing to give up if the other person agrees to give up something. c. Vote and abide by majority decision. d. None of these answers is a win-win strategy. A mask company set up a hospitality tent outside the Olympics arena. Its goal was to eoncourage patrons to view it as an Olympics sponsor even though it had not paid sponsorship fees. This is an example of _____. a gazzelle eats grass and later eaten by Tiger which is the prey Which of the following matrix addition problems are possible? All fifth-grade students are given a test on academic achievement in New York State. Suppose the mean score is 70 for the entire state. A random sample of fifth-grade students is selected from Long Island. Below are the scores in this sample from a normal population. 82 94 66 87 68 85 68 84 70 83 65 70 83 71 82 72 73 81 76 74 a. Construct a 95% confidence interval for the population mean score on Long Island. b. Construct a 90% confidence interval for the population standard deviation of the scores on Long Island. c. A teacher at a Long Island high school claims that the mean score on Long Island is higher than the mean for New York State. Conduct a test to see if this claim is reasonable using = 0.01. d. Find the p-value of the test. Simplify the square root of 30/20 Which statement is true of an appropriate sample of a population? a. A sample must be a group of people who are the target of the survey question. b. A sample should have different characteristics than the population. c. A sample must be very small. d. A sample should include only boys or only girls. Dominant theories of race during the time of W. E. B. Du Bois claimed that race ____ In a popular classroom demonstration, a cotton ball is placed in the bottom of a strong test tube. A plunger fits inside the tube and it makes an air-tight seal. It is then pushed down very rapidly, and the cotton flashes and burns. This happens because ______. Ian infinite nonconducting sheet has surface charge density on one side. How far apart are equi-potential surfacews whose potentials sdiffer by 50 V? n the 1970s, police departments created small units consisting of patrol officers, investigators, and supervisors, assigning them to neighborhoods on a long-term basis in order to increase the exchange of information and improve cooperation, in an effort called ___ The yellow line lies along the contact between sandstone (on the left) and reddish mudstone (on the right). The red arrows point along a place where the sandstone continues into the mudstone. The four sides of the picture are labeled A, B, C and D. What is most likely correct about these rocks?A) When the rocks were deposited, side A was the highest (it was on top).B) When the rocks were deposited, side B was the highest (it was on top).C) When the rocks were deposited, side C was the highest (it was on top).D) When the rocks were deposited, side D was the highest (it was on top).E) The rocks were formed from lava flows far down in the Earth, and were not deposited. "Alfonzo and Wendy were arguing about whether their company should issue par value common stock or no-par value common stock. Alfonzo said that par value stock was better because they could use it to help set the market price of the stock. Wendy disagreed. Who was right and why The Walking Purchase of 1737 was the culmination of well-intentioned bargaining between colonists and natives.True / False. By what cellular process does hair grow back During bone development, immature bone cells called __________ produce bony tissue. Triangle ABC has vertices at A(-3,4)B(4,-2)C(8,3).The triangle is translated 4 units down and 3 units left . Which rule represents the translation? After the translation, what are the coordinates of vertex C What was significant about the decision made by the United States Supreme Court in United States v. Nixon?A)It demonstrated that even a president is subject to the law.B)It meant that the president was protected from investigations by a special prosecutor.C)It forever changed the way that a president appoints a vice president.D)It signified that the president could not tape conversations with advisors in the White House. Convert cis 180 to rectangular form.. -3. -3i. D. . Braden is worried about the grade he'll receive on his essay. Mr. Tompkins encourages him not to worry about his grade. He tells Braden to focus on learning from his past mistakes and improving his writing on the essay. Mr. Tompkins is encouraging which type of motivation? A. Introjected regulation B. Intrinsic C. External regulation D. Extrinsic Steam Workshop Downloader