Which of the following is true about IEEE 802.11i?
A. it uses WEP2 for authentication and encryption
B. it uses a symmetric block cipher for encryption
C. temporal key integrity protocol is used for encryption
D. it uses PMK to generate data encryption keys
Answer: B
You might also like to view...
What is the file extension for a customization file that offers a new, customized Ribbon available on other computers?
A) .export B) .cust C) .UIRibbon D) .exportedUI
Telling the C++ compiler that a function is ____ causes a copy of the function code to be placed in the program at the point where the function is called.
A. inline B. online C. a called function D. a calling function
The software that helps a computer communicate with hardware such as a printer is called a(n) ________
A) firewall B) device driver C) Action Center D) Control Panel
____ works best for art that contains limited numbers of colors and areas with defined borders between areas.
A. PNG B. GIF C. JPG D. JPG