Which data encryption standard is outdated and should never be used?
A. Wired Equivalent Privacy (WEP)
B. Wi-Fi Protected Access (WPA)
C. MAC address filtering
D. Wi-Fi Protected Access 2 (WPA2)
Answer: A
You might also like to view...
NIST SP 800-90, IEEE 802.11i, and TLS/WTLS are three ____________ based on HMAC.
Fill in the blank(s) with the appropriate word(s).
Which of the following is NOT an image editing program?
A) Paint-Shop Pro B) Windows Photo Gallery C) Adobe Acrobat D) Photoshop Elements
The Transpose function is a TEXT fun?ction that can be used to rearrange a range of cells. ____________________
Answer the following statement true (T) or false (F)
Project ____ involves the creation of a specific timetable, usually in the form of charts that show tasks, task dependencies, and critical tasks that may delay a project.
A: planning B: scheduling C: monitoring and controlling D: reporting