Jane, a security administrator, needs to deploy a wireless network where the wireless encryption key is negotiated automatically. Which of the following MUST be implemented?

A. WPA2-PSK
B. 802.1n
C. MAC filtering
D. WPA enterprise


Answer: D. WPA enterprise

Computer Science & Information Technology

You might also like to view...

When the arrow on a JComboBox is clicked:

a. an ItemEvent occurs. b. a scrollbar always appears. c. an ActionEvent occurs. d. The JComboBox expands to a list.

Computer Science & Information Technology

________ typically describe what has already happened and probability describes what is likely to happen in the future

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

One of the most important documents you will need as support for the disaster recovery team is the ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

____ a program means writing down in a prescribed manner the instructions for using the program, the way in which the program performs its tasks, and other items that users, other developers, and management might require.

A. Documenting B. Labeling C. Indexing D. Texting

Computer Science & Information Technology