Which is the strongest form of wireless security?

A. WEP
B. IGP
C. WPA2
D. RADIUS

Answer: C

Computer Science & Information Technology

You might also like to view...

Which of the following is the initial stage in the development process?

A) quality control B) programming C) planning D) data review

Computer Science & Information Technology

A ________ is a report that is embedded within another report—the main report

A) split report B) subform C) subreport D) linked report

Computer Science & Information Technology