____ uses dynamic negotiation of authentication and encryption algorithms between access points and wireless devices.

A. RSN
B. WPA
C. WPA2
D. 802.1i

Answer: A

Computer Science & Information Technology

You might also like to view...

How are link-local IPv6 addresses used?

What will be an ideal response?

Computer Science & Information Technology

__________ benchmark and monitor the status of key system files and detect when an intruder creates, modifies, or deletes monitored files.

A. NIDPSs B. HIDPSs C. AppIDPSs D. SIDPSs

Computer Science & Information Technology