Unlike WEP the PSK is not used for encryption but instead serves as the starting point (____) for mathematically generating the encryption keys.

A. seed
B. per-packet key
C. MIC
D. CRC


Answer: A

Computer Science & Information Technology

You might also like to view...

Answer the following statements true (T) or false (F)

1. As with Playfair, the strength of the Hill cipher is that it completely hides single letter frequencies. 2. A scheme known as a one-time pad is unbreakable because it produces random output that bears no statistical relationship to the plaintext. 3. The one-time pad has unlimited utility and is useful primarily for high-bandwidth channels requiring low security. 4. The most widely used cipher is the Data Encryption Standard. 5. Steganography renders the message unintelligible to outsiders by various transformations of the text.

Computer Science & Information Technology

Computers on a network can store files in folders that are ________ other computers

A) shared with B) joined with C) copied to D) transferred

Computer Science & Information Technology

When you type text in a cell it is ________

A) right-aligned B) fully justified C) centered D) left-aligned

Computer Science & Information Technology

When fingers are already on the keyboard, it often is more efficient to use ____________________, or keyboard key combinations, to format text as it is typed.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology