A home user wishes to secure the wireless network using strong encryption, so they decide to use AES. Which of the following would be used as the encryption method?
A. WEP
B. CCMP
C. TKIP
D. CHAP
Answer: B. CCMP
You might also like to view...
Case-Based Critical Thinking QuestionsCase 6-1James is setting up user accounts on his new computer. He would like to create several accounts with different privileges. Answer the questions James asks himself. James wants to be responsible for changing any settings, accessing and changing any other users' accounts, installing software and hardware, and accessing all files on a computer. What type of user account should he set up?
A. standard user B. administrator C. guest D. manager
Which layer in the defense-in-depth strategy includes firewalls, IDS/IPS devices, segmentation, and VLANs?
A) Physical security B) Network security C) Perimeter security D) Application security
What does the following program do?
```
// What does this program do?
#include
____ is used to group AP divs.
A. Clustering B. Nesting C. Z-indexing D. Overflowing