A security administrator discovered that all communication over the company's encrypted wireless network is being captured by savvy employees with a wireless sniffing tool and is then being decrypted in an attempt to steal other employee's credentials. Which of the following technology is MOST likely in use on the company's wireless?
A. WPA with TKIP
B. VPN over open wireless
C. WEP128-PSK
D. WPA2-Enterprise
Ans: A. WPA with TKIP
Computer Science & Information Technology
You might also like to view...
An HTML comment is delimited by:
a. / /> b. c. -- --> d.
Computer Science & Information Technology
What is a device file? Where are device files located?
What will be an ideal response?
Computer Science & Information Technology
________ is a system tool that searches for little file glitches and fixes them
Fill in the blank(s) with correct word
Computer Science & Information Technology
The ____________________ function can be used to determine if a variable contains values.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology