You are on page 1of 2

1.

)May leave your wireless network completely


vulnerable.
__________________________
2.) Sharing or offering access to digital
information/resources, including documents,
multimedia (audio/video) , graphics, computer
programs , images and e-books.
__________________________
3.) An improve version of WEP.
_________________________
4.) Allow groups of computer users to share
peripheral devices such as printer.
__________________________
5.)How many steps does the Sharing Resources and
Accessing Shared Resources has?
__________________________
6.) WEP -
7.) SSID -
8.) WPA-
9.) ______Network and Sharing Center by clicking
Start button, and then clicking Control Panel. In
the search box, type network , then click Network
and Sharing Center.
10.) _____ Set up a new connection or network.

Different Levels of Wireless Security


(from most secure to least secure)

__ Wi-Fi Protected Access (WPA)


__ No security
__ Lightweight Extensible Authentication Protocol
(LEAP )
__ WEP 64
__ WEP128

You might also like