Which of the following are among the 802.11 cryptography objectives? 

A. efficient
B. self-synchronizing
C. mandatory
D. exclusive

Ans:
A. efficient
B. self-synchronizing

Computer Science & Information Technology

You might also like to view...

The field that uniquely identifies a record is the ________ key

A) truncated B) exclusive C) foreign D) primary

Computer Science & Information Technology

Which of the following tools or methods can discover security weaknesses, including misconfigurations, out of date software, missing patches, and open ports?

A. port scanner B. vulnerability scanner C. HTTP interceptor D. ping sweep

Computer Science & Information Technology