A company requires that all wireless communication be compliant with the Advanced encryption standard. The current wireless infrastructure implements WEP + TKIP. Which of the following wireless protocols should be implemented?

A. Incident identification
B. Implement mitigation
C. Chain of custody
D. Capture system image


Answer: B. Implement mitigation

Computer Science & Information Technology

You might also like to view...

All data entered in a table must be visible within the column. Anything that is not visible in the column will be cutoff

Indicate whether the statement is true or false

Computer Science & Information Technology

Meeting project goals, tasks, and deadlines are all included in the project ________

A) resources B) scope C) milestones D) constraints

Computer Science & Information Technology

Which of the following regular expression metacharacters looks for a match at the end of a string?

A. \A B. \Z C. \w D. \d

Computer Science & Information Technology

To enable Find My Mac, start iCloud

Indicate whether the statement is true or false

Computer Science & Information Technology