Question1: What are the various technologies employed by wireless devices to maximize their use of the available radio frequencies? Also discuss methods used to secure 802.11 wireless networking in your initial thread.
Please make your initial post and two response posts substantive. A substantive post will do at least TWO of the following:
Question2: After reading chapter 1, compare and contrast two fundamental security design principles. Analyze how these principles and how they impact an organizations security posture. The initial post must be completed by Thursday at 11:59 eastern. You are also required to post a response to a minimum of two other student in the class by the end of the week. You must use at least one scholarly resource.