Match each item with an statement below:
A. allows a device to become authenticated to an AP before moving into range of the AP.
B. intended for settings in which an authentication server is unavailable.
C. encryption protocol in the 802.11i standard.
D. allows a company to maintain user profiles in a central database that all remote servers can share.
E. subset of 802.11i that addresses both encryption and authentication.
F. designed for medium to large-sized organizations such as businesses, government agencies, and universities.
G. "leases" IP addresses to clients to use while they are connected to the network.
H. second generation of WPA security.
I. manipulates an entire block of text at one time.
A. Pre-authentication
B. Personal security model
C. AES-CCMP
D. RADIUS
E. WPA
F. Enterprise security model
G. DHCP
H. WPA2
I. Block cipher
You might also like to view...
Case-Based Critical Thinking QuestionsCase 2Libby is designing a new form in Access 2013. She has just figured out how to use form events to maximum advantage in the design of her new form. When her form closes, Libby wants to launch an informational MessageBox with the following statement, “Thank you for using this form to add records to the database, or to update existing records.” What event will allow Libby to trigger this MessageBox action?
A. On Close B. On Deactivate C. On Unload D. On Delete
When you ____ an object, you extend the object on its Z-axis.
A. extrude B. pinch C. expand D. shrink
A common control which displays the values in a field is called a(n) ________ Box control
Fill in the blank(s) with correct word
A(n) ____ cell displays normal text that is left-aligned.
Fill in the blank(s) with the appropriate word(s).Fill in the blank(s) with the appropriate word(s).