Which of the following are among the 802.11 cryptography objectives?
A. efficient
B. self-synchronizing
C. mandatory
D. exclusive
Ans:
A. efficient
B. self-synchronizing
Computer Science & Information Technology
You might also like to view...
The field that uniquely identifies a record is the ________ key
A) truncated B) exclusive C) foreign D) primary
Computer Science & Information Technology
Which of the following tools or methods can discover security weaknesses, including misconfigurations, out of date software, missing patches, and open ports?
A. port scanner B. vulnerability scanner C. HTTP interceptor D. ping sweep
Computer Science & Information Technology