Wired equivalent privacy (WEP) is intended to guard one of the three CIA characteristics of information, namely ____.

A. confidentiality
B. integrity
C. availability
D. non-repudiation


Answer: A

Computer Science & Information Technology

You might also like to view...

The best that can be done to determine if a PRNG generates numbers that have the characteristic of randomness is on the basis of multiple tests. These tests should seek to establish uniformity, scalability, and __________ .

A. consistency B. authentication C. frequency D. sequencing

Computer Science & Information Technology

In Twitter, Tweets are limited to 140 characters

Indicate whether the statement is true or false

Computer Science & Information Technology

To delete a database, you use the ____________________ function.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The header node is placed at the ____ of a list.

A. middle B. end C. beginning D. key location

Computer Science & Information Technology