Completion requirements
This video discusses six names for wireless Internet connections, and how to view the wireless connection manager program on a device to determine if the connection is encrypted. Why is it important to know if the connection is encrypted? How close does a wireless eavesdropper have to be to intercept a signal between a computer and a router?
Source: IowaCyber, https://www.youtube.com/watch?v=TTTZ1JqiuU8 This work is licensed under a Creative Commons Attribution 3.0 License.
Last modified: Friday, 2 August 2024, 11:03 AM