Encryption in 802.11i is accomplished by replacing the RC4 stream cipher algorithm with a ____.

A. block cipher
B. chain cipher
C. text cipher
D. CRC cipher


Answer: A

Computer Science & Information Technology

You might also like to view...

Which of the following can be used to define which programs are allowed or disallowed in the system?

A. Software restriction policies B. A network zone C. Local policies D. AppLocker

Computer Science & Information Technology

Referring to the figure above, using the descendent selector #navlist a creates a style rule that applies to every link in the navlist list, ____ in the site.

A. and to all other links B. but to no other links C. and to contextual links D. and to links in any list

Computer Science & Information Technology

Talk about the use of cookies in ecommerce. Discuss how they are useful. Are they potentially dangerous?

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

You are troubleshooting a desktop with intermittent issues locking up and system errors. You suspect that the motherboard is not getting enough power. Which is the best tool to determine if the hypothesis is correct?

A. POST card B. Loopback plug C. Multimeter D. Cable tester

Computer Science & Information Technology