A small business has an open wireless network, which allows vendors to join without logging in. The owners are concerned that a close company is connecting to and utilizing the wireless network without permission. Which of the following configuration settings should be updated to address these issues if the small business demands that the network remain open?
Comments