Study for the TestOut LabSim A+ Certification Exam. Our quiz includes flashcards and multiple-choice questions, each with hints and detailed explanations. Prepare with confidence!

Each practice test/flash card set has 50 randomly selected questions from a bank of over 500. You'll get a new set of questions each time!

Practice this question and more.


What are two effective measures to prevent unauthorized access to a wireless access point?

  1. Change the router’s physical location

  2. Disable SSID broadcast on the AP

  3. Enable MAC address filtering

  4. Implement WPA2

The correct answer is: Disable SSID broadcast on the AP

Disabling SSID broadcast on the access point is a measure that can help obscure the network from casual users. When the SSID (Service Set Identifier) is not broadcasted, the network name does not appear in the list of available networks that devices typically scan for, making it less visible. This can deter unauthorized users who are searching for networks to access. However, it is essential to understand that disabling SSID broadcasting is not a foolproof method for securing wireless access, as knowledgeable attackers can still discover hidden networks with the right tools. Implementing WPA2 is an equally vital measure for securing wireless access. This security protocol encrypts data transmitted over the wireless network, making it significantly harder for unauthorized users to intercept or access the information being communicated. WPA2 is widely regarded as a robust security framework necessary for safeguarding wireless networks and is essential in conjunction with other preventive measures. In contrast, changing the router’s physical location may provide some security benefits by placing the access point further from potential unauthorized users, but it is not a comprehensive solution by itself. Similarly, while MAC address filtering can restrict network access to specific devices based on their physical hardware addresses, it can be circumvented by someone with more in-depth technical knowledge. Thus, while these strategies can