Your company is implementing a wireless network and is concerned that someone from a competing company could stand outside the building and collect wireless data. You have assured the company that WPA2 is secure.
 
What makes WPA2 more secure than WPA?

A. AES
B. TKIP
C. RADIUS
D. TACACS


Answer: A

Computer Science & Information Technology

You might also like to view...

Analyze the following code:

``` public class Test { private int t; public static void main(String[] args) { int x; System.out.println(t); } }``` a. The variable t is not initialized and therefore causes errors. b. The variable t is private and therefore cannot be accessed in the main method. c. t is non-static and it cannot be referenced in a static context in the main method. d. The variable x is not initialized and therefore causes errors. e. The program compiles and runs fine.

Computer Science & Information Technology

A ____ uses the Internet to harass a particular target, often using fake identities or public Web sites to enable the harassment.

A. griefer B. cyberbully C. sociopath D. troll

Computer Science & Information Technology

Security on the Mac OS X operating system is provided by ____________________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The ____ is used to create traditional computer programs, or active Web pages using Java applets.

A. Java programming language B. Java interpreter C. Java development environment D. Java program standard

Computer Science & Information Technology