Which of the following wireless encryption standards uses AES encryption?

a. WEP
b. WPA
c. WPA2
d. EFS


C. WPA2 is a WEP replacement that introduced a new AES-based algorithm.

Computer Science & Information Technology

You might also like to view...

The first character in a string has an index of .

a. the length of the string – 1 b. 0 c. 1 d. –1

Computer Science & Information Technology

Open Read-Only opens the database so that changes can be made, but no one else may open the database at the same time

Indicate whether the statement is true or false

Computer Science & Information Technology

The way to display two documents next to each other in separate windows is to use ________

A) Combine setting B) Two Pages view C) Compare setting D) View Side by Side Setting

Computer Science & Information Technology

To save the position and orientation of an object, Alice provides special invisible objects called ____.

A. shots B. attributes C. markers D. clips

Computer Science & Information Technology