Jane, a security technician, wants to implement secure wireless with authentication. Which of the following allows for wireless to be authenticated via MSCHAPv2?
A. PEAP
B. WPA2 personal
C. TKIP
D. CCMP
Answer: A. PEAP
You might also like to view...
Operating systems use ________, often provided by hardware manufacturers, to perform device-specific I/O operations.
a) controllers b) device drivers c) APIs d) none of the above
Which of the following statements is NOT true regarding embedded devices and cyber-physical systems?
a. Machine-to-machine (M2M) communication, the Internet of Things (IoT), and remotely- controlled industrial systems have increased the number of connected devices and simultaneously made these devices targets. b. A hacker can use reverse communication to take over the device with the embedded system. c. Security professionals must be increasingly involved in the inclusion of these devices to ensure that security controls are designed to them and the data they collect and transmit. d. Security is always built into these devices.
Identify the letter of the choice that best matches the phrase or definition.
A. Any page created in HTML that can be placed on the World Wide Web B. Can include a collection of many interconnected Web pages C. Designed especially for new visitors to a Web site D. A targeted "welcome" page used by Web advertisers E. The main or primary Web page for a corporation, organization, or individual
Use the ________ data type when you do not know how much text space will be required.
Fill in the blank(s) with the appropriate word(s).