Wired equivalent privacy (WEP) is intended to guard one of the three CIA characteristics of information, namely ____.

A. confidentiality
B. integrity
C. availability
D. non-repudiation


Answer: A

Computer Science & Information Technology

You might also like to view...

In the accompanying figure, which line of code does not add a page break after the last box?

A. 2 B. 3 C. 1 D. 4

Computer Science & Information Technology

Pointing to a sizing handle of a chart allows you to move it. __________________________

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

What should you use if you wish to execute two or more statements conditionally?

A. A switch statement. B. A block enclosed within a pair of curly braces. C. A defined sequence structure. D. A declared decision structure.

Computer Science & Information Technology

Multitasking

What will be an ideal response?

Computer Science & Information Technology