Two companies want to build an encrypted tunnel between them and use a PSK for initial authentication. Which of the following is the BEST protocol for the companies to use?
An administrator needs to connect two laptops directly to each other using 802.11ac but does not have an AP available. Which of the following describes this configuration?
Which of the following objectives does an evil twin achieve?
A technician is concerned about unauthorized personnel moving assets that are installed in a data center server rack. The technician installs a networked
sensor that sends an alert when the server rack door is opened. Which of the following did the technician install?