Which of the following wireless encryption standards uses AES encryption?
a. WEP
b. WPA
c. WPA2
d. EFS
C. WPA2 is a WEP replacement that introduced a new AES-based algorithm.
Computer Science & Information Technology
You might also like to view...
The first character in a string has an index of .
a. the length of the string – 1 b. 0 c. 1 d. –1
Computer Science & Information Technology
Open Read-Only opens the database so that changes can be made, but no one else may open the database at the same time
Indicate whether the statement is true or false
Computer Science & Information Technology
The way to display two documents next to each other in separate windows is to use ________
A) Combine setting B) Two Pages view C) Compare setting D) View Side by Side Setting
Computer Science & Information Technology
To save the position and orientation of an object, Alice provides special invisible objects called ____.
A. shots B. attributes C. markers D. clips
Computer Science & Information Technology