A home user wishes to secure the wireless network using strong encryption, so they decide to use AES. Which of the following would be used as the encryption method?

A. WEP
B. CCMP
C. TKIP
D. CHAP


Answer: B. CCMP

Computer Science & Information Technology

You might also like to view...

Case-Based Critical Thinking QuestionsCase 6-1James is setting up user accounts on his new computer. He would like to create several accounts with different privileges. Answer the questions James asks himself. James wants to be responsible for changing any settings, accessing and changing any other users' accounts, installing software and hardware, and accessing all files on a computer. What type of user account should he set up?

A. standard user B. administrator C. guest D. manager

Computer Science & Information Technology

Which layer in the defense-in-depth strategy includes firewalls, IDS/IPS devices, segmentation, and VLANs?

A) Physical security B) Network security C) Perimeter security D) Application security

Computer Science & Information Technology

What does the following program do?

``` // What does this program do? #include using namespace std; void someFunction( int [], int, int ); // function prototype int main() { const int arraySize = 10; int a[ arraySize ] = { 1, 2, 3, 4, 5, 6, 7, 8, 9, 10 }; cout << "The values in the array are:" << endl; someFunction( a, 0, arraySize ); cout << endl; } // end main // What does this function do? void someFunction( int b[], int current, int size ) { if ( current < size ) { someFunction( b, current + 1, size ); cout << b[ current ] << " "; } // end if } // end function someFunction ```

Computer Science & Information Technology

____ is used to group AP divs.

A. Clustering B. Nesting C. Z-indexing D. Overflowing

Computer Science & Information Technology