Which of the following protocols is the LEAST secure and should be avoided on a wireless network?
A. WEP
B. PEAP
C. WPA
D. TKIP
Ans: A. WEP
Computer Science & Information Technology
You might also like to view...
By installing and using the Active Directory Certificate Services role, a Public Key Infrastructure (PKI) is established.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
What is the Story Editor? How is it used, and how does it make editing easier?
What will be an ideal response?
Computer Science & Information Technology