IEEE ____ addresses both weaknesses of WEP by allowing the keys, encryption algorithms, and negotiation to be dynamically assigned, and by adopting the AES encryption based on the Rijndael algorithm with 128-, 192-, or 256-bit keys.?

A. ?802.11a
B. ?802.11b
C. ?802.11g
D. ?802.11i


Answer: D

Computer Science & Information Technology

You might also like to view...

Answer the following statements true (T) or false (F)

1. An iteration structure is always needed to process a menu selection made by a user. 2. An If-Then-Else statement can be used as one way to process a user's menu selection. 3. The user's menu selection can be validated using an input validation loop immediately after the input statements. 4. It is never possible to give a user a chance to make more than one selection without re-running the whole program.

Computer Science & Information Technology

[CD] Write a CSS stylesheet that results in the text Welcome to XML! being displayed in blue Times 20 pt.

What will be an ideal response?

Computer Science & Information Technology

Setting state on a firewall profile allows you to either block connections with configured exceptions or block all connections

Indicate whether the statement is true or false

Computer Science & Information Technology

Which term describes the cabling that goes more or less horizontally from a work area to the telecommunications room?

A. Vertical run B. Structured cabling run C. Demarcation run D. Horizontal cabling run

Computer Science & Information Technology