Sara, a network security administrator, has been tasked with setting up a guest wireless network for her corporation. The requirements for this connection state that it must have password authentication, with passwords being changed every week. Which of the following security protocols would meet this goal in the MOST secure manner?
A. WPA - CCMP
B. WPA - PSK
C. WPA2-CCMP
D. WPA2-PSK
Answer: D. WPA2-PSK
Computer Science & Information Technology
You might also like to view...
What does the following code output?
``` DecimalFormat dfQuestion = new DecimalFormat("#0.##E0"); System.out.println(dfQuestion.format(12.7896987)); ``` (a) 12.79E0 (b) 12.8E0 (c) 1.28E1 (d) .13E2
Computer Science & Information Technology
Compare the Trivial File Transfer Protocol (TFTP) to FTP.
What will be an ideal response?
Computer Science & Information Technology
A(n) ________ error occurs when a completed line of code is entered that the Visual Basic Editor does not recognize
A) syntax B) compiling C) unidentified D) execution
Computer Science & Information Technology
When selecting new styles, the format changes of the paragraph is only the preview until you click a certain Style
Indicate whether the statement is true or false
Computer Science & Information Technology