WPA authentication can be accomplished by using either IEEE 802.1x or ____________________ technology.

Fill in the blank(s) with the appropriate word(s).


PSK

Computer Science & Information Technology

You might also like to view...

Arpspoof, part of the Ettercap suite, can be used to spoof ARP tables.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

What type of network uses an unsecured public network, such as the Internet, as if it were a secure private network?

A. ad hoc network B. virtual private network C. secure access network D. free access network

Computer Science & Information Technology

Each part of a pie chart is shown as a ____ of the pie.

A. bowl B. slice C. serving D. dish

Computer Science & Information Technology

____________________ is a skill level in which a trainee has gone beyond basic skills to be able to perform a task effectively and efficiently.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology