A company requires that all wireless communication be compliant with the Advanced encryption standard. The current wireless infrastructure implements WEP + TKIP. Which of the following wireless protocols should be implemented?
A. Incident identification
B. Implement mitigation
C. Chain of custody
D. Capture system image
Answer: B. Implement mitigation
Computer Science & Information Technology
You might also like to view...
All data entered in a table must be visible within the column. Anything that is not visible in the column will be cutoff
Indicate whether the statement is true or false
Computer Science & Information Technology
Meeting project goals, tasks, and deadlines are all included in the project ________
A) resources B) scope C) milestones D) constraints
Computer Science & Information Technology
Which of the following regular expression metacharacters looks for a match at the end of a string?
A. \A B. \Z C. \w D. \d
Computer Science & Information Technology
To enable Find My Mac, start iCloud
Indicate whether the statement is true or false
Computer Science & Information Technology