A security administrator discovered that all communication over the company's encrypted wireless network is being captured by savvy employees with a wireless sniffing tool and is then being decrypted in an attempt to steal other employee's credentials. Which of the following technology is MOST likely in use on the company's wireless?

A. WPA with TKIP
B. VPN over open wireless
C. WEP128-PSK
D. WPA2-Enterprise


Ans: A. WPA with TKIP

Computer Science & Information Technology

You might also like to view...

An HTML comment is delimited by:

a. b. c. d.

Computer Science & Information Technology

What is a device file? Where are device files located?

What will be an ideal response?

Computer Science & Information Technology

________ is a system tool that searches for little file glitches and fixes them

Fill in the blank(s) with correct word

Computer Science & Information Technology

The ____________________ function can be used to determine if a variable contains values.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology