A security administrator must implement a wireless encryption system to secure mobile devices' communication. Some users have mobile devices which only support 56-bit encryption. Which of the following wireless encryption methods should be implemented?
A. RC4
B. AES
C. MD5
D. TKIP
Answer: A. RC4
Computer Science & Information Technology
You might also like to view...
The ______________ describes how the function will work.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
Which port number does SNMP use, and which transport protocol does it use?
What will be an ideal response?
Computer Science & Information Technology
Users typically put both personal items and academic or business items in the same calendar.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
If n = 1000, then to sort the list, selection sort makes about 50,000 key comparisons.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology