Jane, a security administrator, needs to deploy a wireless network where the wireless encryption key is negotiated automatically. Which of the following MUST be implemented?
A. WPA2-PSK
B. 802.1n
C. MAC filtering
D. WPA enterprise
Answer: D. WPA enterprise
You might also like to view...
When the arrow on a JComboBox is clicked:
a. an ItemEvent occurs. b. a scrollbar always appears. c. an ActionEvent occurs. d. The JComboBox expands to a list.
________ typically describe what has already happened and probability describes what is likely to happen in the future
Fill in the blank(s) with the appropriate word(s).
One of the most important documents you will need as support for the disaster recovery team is the ________
Fill in the blank(s) with correct word
____ a program means writing down in a prescribed manner the instructions for using the program, the way in which the program performs its tasks, and other items that users, other developers, and management might require.
A. Documenting B. Labeling C. Indexing D. Texting