Which one of the following is the data encryption and integrity method used by WPA2?
A) CCMP
B) GCMP
C) TKIP
D) WIPS
Answer: A) CCMP
Explanation: WPA2 uses CCMP only. WEP has been deprecated and is not used in any of the WPA versions. TKIP has been deprecated but can be used in WPA only. WPA is not a correct answer because it is an earlier version of WPA2.
You might also like to view...
Proxy classes are best described as an example of:
a. Object-oriented programming (as used in the text). b. Structured programming. c. Information hiding. d. Utility functions.
An advantage of inheritance is that:
a. All methods can be inherited. b. All instance variables can be uniformly accessed by subclasses and superclasses. c. Objects of a subclass can be treated like objects of their superclass. d. None of the above.
The three categories of mobile traffic are ________. (Choose three correct answers.)
A) Mobile data traffic B) Internet traffic C) PLC traffic D) Managed IP traffic
Which layer of the TCP/IP model processes requests from hosts to ensure that a connection is made to the appropriate port?
What will be an ideal response?