- What do you think is the best combination of the types of authentication? Is that type of authentication appropriate for all types of access?
- Some have made the argument that using WEP presents more security issues than if all traffic were in the clear. What do you think?