WPA replaces WEP with an encryption technology called ____.

A. Secure Shell (SSH)
B. Temporal Key Integrity Protocol (TKIP)
C. Message Integrity Check (MIC)
D. Message Authentication Code (MAC)


Answer: B

Computer Science & Information Technology

You might also like to view...

No actual traffic passes through a passive sensor; it only monitors copies of the traffic.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

In a complex formula,and are two examples of ____.

A. commands B. arguments C. mathematical operators D. fill handles

Computer Science & Information Technology

A 3-D reference is a pointer to a cell in another worksheet

Indicate whether the statement is true or false

Computer Science & Information Technology

All are part of Kerberos except __________ .

a. KDC b. AS c. PAP d. TGS

Computer Science & Information Technology