The Wired Equivalent Privacy (WEP) uses which encryption algorithm to encrypt data?

A) Blowfish
B) HMAC
C) AES
D) RC4


Answer: D) RC4

Computer Science & Information Technology

You might also like to view...

The @font-face rule is one example of a CSS @rule, which specifies a command or directive that controls how browsers interpret and run the contents of a CSS style sheet.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

To make columns B - D in a table equal width, you must first

A. click the Distribute Columns button B. click the Distribute Rows button C. select columns B - D D. key the desired width in the Cell Width box

Computer Science & Information Technology

The ____ numbering system is base 16; in other words, 16 numerals are used to express any given number.

A. binary B. decimal C. hexadecimal D. vigesimal

Computer Science & Information Technology

The Tools panel is divided into ____ sections.

A. 6 B. 8 C. 4 D. 10

Computer Science & Information Technology