Jane, a security administrator, needs to implement a secure wireless authentication method that uses a remote RADIUS server for authentication. Which of the following is an authentication method Jane should use?
A. WPA2-PSK
B. WEP-PSK
C. CCMP
D. LEAP
Answer: D. LEAP
You might also like to view...
A package is:
a. A directory structure used to organize classes and interfaces. b. A mechanism for software reuse. c. A group of related classes and interfaces. d. All of the above.
To set up a file to perform file I/O, you must declare
A) at least one variable to write to the file. B) one or more file stream objects. C) a string array to store the file contents. D) All of the above E) None of the above
Insert a column ________ to manually align columns in a more even fashion; for example, forcing a column to start at the top of a page
Fill in the blank(s) with correct word
A 20th century date is assumed when a two digit year between ________ is entered in a worksheet cell
A) 10 and 79 B) 30 and 99 C) 20 and 89 D) 00 and 69