Which of the following is the MOST secure wireless encryption?

A. ESSID
B. WPA
C. WPA2
D. WEP


Answer: C. WPA2

Computer Science & Information Technology

You might also like to view...

When creating a bulleted or numbered list, each time you press the _____ key, PowerPoint generates a new bullet or number.

A. Enter B. Space C. New Bullet D. New Item

Computer Science & Information Technology

A valuable tool to have at your disposal when preparing or checking cables is a cable ____________________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

A(n) _____ is a field or set of fields that uniquely identify a record.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Match the causes to their effects:

1. Computer security failure 2. Strike 3. Accident 4. Technological breakdown 5. Sabotage and terrorism A. flooding caused by a waterline break B. requires special security measures to be put into place C. by far the most insidious threat to an organization D. hackers get in without any notice E. utility failures

Computer Science & Information Technology