When connected to a secure WAP, which of the following encryption technologies is MOST likely to be configured when connecting to WPA2-PSK?
A. DES
B. AES
C. MD5
D. WEP
A B. AES
Computer Science & Information Technology
You might also like to view...
When using ________ addressing, a computer is assigned a temporary address from available IP addresses
Fill in the blank(s) with correct word
Computer Science & Information Technology
Which of the following statements best describes strategic risk?
A. Risk that relates to monetary loss B. Risk that relates to adverse business decisions C. Risk that relates to a loss from failed or inadequate systems and processes D. Risk that relates to violation of laws, regulations, or policy
Computer Science & Information Technology