Which one of the following is the data encryption and integrity method used by WPA2?

A) CCMP
B) GCMP
C) TKIP
D) WIPS


Answer: A) CCMP

Explanation: WPA2 uses CCMP only. WEP has been deprecated and is not used in any of the WPA versions. TKIP has been deprecated but can be used in WPA only. WPA is not a correct answer because it is an earlier version of WPA2.

Computer Science & Information Technology

You might also like to view...

Proxy classes are best described as an example of:

a. Object-oriented programming (as used in the text). b. Structured programming. c. Information hiding. d. Utility functions.

Computer Science & Information Technology

An advantage of inheritance is that:

a. All methods can be inherited. b. All instance variables can be uniformly accessed by subclasses and superclasses. c. Objects of a subclass can be treated like objects of their superclass. d. None of the above.

Computer Science & Information Technology

The three categories of mobile traffic are ________. (Choose three correct answers.)

A) Mobile data traffic B) Internet traffic C) PLC traffic D) Managed IP traffic

Computer Science & Information Technology

Which layer of the TCP/IP model processes requests from hosts to ensure that a connection is made to the appropriate port?

What will be an ideal response?

Computer Science & Information Technology