What encryption protocol was designed as more of an integrity check for WEP transmissions rather than a sophisticated encryption protocol??

A. ?Kerberos
B. ?TKIP
C. ?AES
D. ?EAP

Answer: B

Computer Science & Information Technology

You might also like to view...

________ can get in without any notice through standard ports that are left open

Fill in the blank(s) with correct word

Computer Science & Information Technology

TKIP keys are known as ____ keys.

A. per-packet B. CRC C. MIC D. MAC

Computer Science & Information Technology