Which of the following is true about IEEE 802.11i?

A. it uses WEP2 for authentication and encryption
B. it uses a symmetric block cipher for encryption
C. temporal key integrity protocol is used for encryption
D. it uses PMK to generate data encryption keys


Answer: B

Computer Science & Information Technology

You might also like to view...

What is the file extension for a customization file that offers a new, customized Ribbon available on other computers?

A) .export B) .cust C) .UIRibbon D) .exportedUI

Computer Science & Information Technology

Telling the C++ compiler that a function is ____ causes a copy of the function code to be placed in the program at the point where the function is called.

A. inline B. online C. a called function D. a calling function

Computer Science & Information Technology

The software that helps a computer communicate with hardware such as a printer is called a(n) ________

A) firewall B) device driver C) Action Center D) Control Panel

Computer Science & Information Technology

____ works best for art that contains limited numbers of colors and areas with defined borders between areas.

A. PNG B. GIF C. JPG D. JPG

Computer Science & Information Technology