A security administrator must implement a wireless encryption system to secure mobile devices' communication. Some users have mobile devices which only support 56-bit encryption. Which of the following wireless encryption methods should be implemented?

A. RC4
B. AES
C. MD5
D. TKIP


Answer: A. RC4

Computer Science & Information Technology

You might also like to view...

The ______________ describes how the function will work.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Which port number does SNMP use, and which transport protocol does it use?

What will be an ideal response?

Computer Science & Information Technology

Users typically put both personal items and academic or business items in the same calendar.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

If n = 1000, then to sort the list, selection sort makes about 50,000 key comparisons.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology