Which of the following protocols uses AES and the Counter Mode Cipher Block Chaining Message Authentication Code Protocol (CCMP) for wireless data encryption?

A. WEP
B. WPA3
C. WPA2
D. WPA


Ans: C. WPA2

Computer Science & Information Technology

You might also like to view...

Which statement is true when a superclass has protected instance variables?

a. A subclass object can assign an invalid value to the superclass’s instance variables, thus leaving an object in an inconsistent state. b. Subclass methods are more likely to be written so that they depend on the superclass’s data implementation. c. We may need to modify all the subclasses of the superclass if the superclass implementation changes. d. All of the above.

Computer Science & Information Technology

typedef is used to:

a. Create a type name that is an alias for another type name. b. Make a struct private. c. Cast one struct to another type. d. Initialize struct members.

Computer Science & Information Technology

When you test a movie, it loops endlessly unless you add a(n) ____________________ to stop the movie at a certain frame.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

A computer system consists of hardware and ____.

A. an operating system B. software C. primary storage D. printer E. keyboard

Computer Science & Information Technology