Match the protocol or encryption name with the feature.

A. No longer considered secure because the key used for encryption doesn’t change.
B. Typically uses TKIP for encryption.
C. Typically uses AES for encryption.
D. Generates a different key for every transmission; however, the encryption algorithm used for its calculations is no longer considered secure.
E. Current encryption algorithm used today.


A. WEP
B. WPA
C. WPA2
D. TKIP
E. AES

Computer Science & Information Technology

You might also like to view...

The basic syntax to use the LINQ to select and arrange records in a data set is ____.

A. Dim variableName = In dataset.table From elementName B. Dim variableName = From elementName In dataset.table C. Dim In dataset.table From elementName = variableName D. Dim From elementName In dataset.table = variableName

Computer Science & Information Technology

Some file properties can be user-modified with customized tags that describe and categorize files.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Internet footprinting is a technical method of reconnaissance, which interests budding hackers and network security specialists alike.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Proposed revisions can be placed in balloons or displayed in the document

Indicate whether the statement is true or false

Computer Science & Information Technology