A network technician attempts to limit access to a wireless network by using WPA2 and a pre-shared key; however, employees have been sharing this key with others. Which of the following methods should the technician configure on the wireless access point to ensure only corporate systems can connect using the least amount of effort?
F6665GG
2 years agoJustHappyToBeHere
3 years, 2 months ago[Removed]
3 years, 2 months agoangelsergio
3 years, 11 months agoG0dfather
3 years, 6 months agoconnelldma2
4 years agoconnelldma2
4 years agoTedTheAtheist
4 years, 4 months agoMrNYC
4 years, 2 months ago