This data encryption standard is the weakest of the wireless encryption standards, with many problems, including encryption that is easy to break; it only encrypts the Data Link and Physical layers, the key is static and shared, and there is no mechanism for performing user authentication.
A. Wired Equivalent Privacy (WEP)
B. Mac address filtering
C. Wi-Fi Protected Access (WPA)
D. Wi-Fi Protected Access 2 (WPA2)
Answer: A
You might also like to view...
A router has three network routes to a destination. The routing protocols used for the paths are OSPF, EIGRP, and RIP. Based on administrative distance, what is the routing protocol with the smallest default distance value?
What will be an ideal response?
What attributes are valid for the select element?
a. name, id, multiple b. name, id, multiple, rows, cols c. name, id, multiple, selected d. name, id, multiple, checked
?User documentation _____.
A. ?allows users to prepare overall documentation, such as process descriptions and report layouts, early in the software development life cycle (SDLC) B. ?describes a system's functions and how they are implemented C. ?contains all the information needed for users to process and distribute online and printed output D. ?consists of instructions and information to users who will interact with the system
A network technician is installing a new network switch is looking for an appropriate fiber optic patch cable. The fiber optic patch panel uses a twist-style connector. The switch uses a SFP module. Which of the following connector types should the fiber patch cable have?
A. LC B. ST C. SC D. MTRJ E. MTP