Match the protocol or encryption name with the feature.

A. No longer considered secure because the key used for encryption doesn’t change.
B. Typically uses TKIP for encryption.
C. Typically uses AES for encryption.
D. Generates a different key for every transmission; however, the encryption algorithm used for its calculations is no longer considered secure.
E. Current encryption algorithm used today.


A. WEP
B. WPA
C. WPA2
D. TKIP
E. AES

Computer Science & Information Technology

You might also like to view...

Case-Based Critical Thinking QuestionsCase 2-1Abby has selected fonts in the past for her Web sites without knowing much about them, so she has resolved to learning more about them so that she can make even more informed choices in the future. If Abby wants to stay away from the most common serif typeface, so as not to use one that is overused, which one will she avoid?

A. Times New Roman B. Arial C. Garamond D. Helvetica

Computer Science & Information Technology

The ________ tab displays Microsoft Office Backstage view where all of the commands related to files are found

Fill in the blank(s) with correct word

Computer Science & Information Technology

A Windows file name CANNOT contain the * character

Indicate whether the statement is true or false

Computer Science & Information Technology

____ is an online news tool designed for facilitating the delivery of news articles, podcasts, and other content regularly published to a Web site.

A. VoIP B. RSS C. Video-on-demand D. Blog

Computer Science & Information Technology