answersLogoWhite

0


Best Answer

installing the WAP protocol

User Avatar

Wiki User

13y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: A company uses computers and wireless access points from a variety of different suppliers Which wireless security protocol should the company use to achieve the best level of security?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

What is SSL protocol?

The Secure Socket Layer (SSL) is a security protocol deployed on networks. The network can be an internal network or the internet over which two computers are communicating.


What is the best webcam security for computers?

There are many different types of webcam security for computers available on the market. However, most webcam's come with built-in security features and options.


AH and ESP protocol works on security in network layer?

The AH (Authentication Header) protocol and the ESP (Encapsulating Security Payload) protocol both function within the network layer. They are part of the IPSec (Internet Protocol Security) standard.


Who are the stakeholders in Morrison's supermarket?

staff, customers, suppliers, owners, security suppliers, etc


How do you open a Campas Security safe protocol when combination is lost?

You have to reset the Campas Security Safe Protocol when the combination is lost.


How do you say security protocol in Hebrew?

security protocol = prōtōkōl beet-chōni (פרוטוקול ביטחוני)


Why is ssh protocol used to access security devices?

SSH protocol which is also referred as Secure Shell is a secure remote login method to login to computers at a different or remote location. It provides strong authentication method and also secures the communications and integrety between the two with strong encryptions. It is a very secured option to the unprotected login protocols and FTP methods. This is the main reason for using this for accessing security devices so that they remain secured. Visit the official website of Foxpass to know more on SSH Key Security.


How does protocol address security?

Protocol addresses security by establishing guidelines to prevent potential problems. As long as these routines are strictly followed, the chances of a security breach occurring are greatly reduced.


Which protocol is used for eCommerce?

Security is an essential part of any transaction that takes place over the internet. Online business uses transport layer security protocol and secure socket layer protocol.


How does voip security work?

Voice over internet protocol, the sound is recorded onto a computer then transfered to a differnt computer for storage. This enables two or more computers to communicate with each other.


What is the protocol that adds security to remote connections?

SSH


What is 802.11 protocol that enhances wireless security?

802.11i