Which of the following protocols is the LEAST secure and should be avoided on a wireless network?

A. WEP
B. PEAP
C. WPA
D. TKIP

Ans: A. WEP

Computer Science & Information Technology

You might also like to view...

By installing and using the Active Directory Certificate Services role, a Public Key Infrastructure (PKI) is established.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

What is the Story Editor? How is it used, and how does it make editing easier?

What will be an ideal response?

Computer Science & Information Technology