Which of the following encryption methods is considered easily broken and should be avoided when configuring wireless security?

A. WEP
B. WPA
C. AES
D. TKIP

Answer: A. WEP

Computer Science & Information Technology

You might also like to view...

The option to save a presentation in PDF file format is an Export option located on the ________ tab

A) Slide Show B) Insert C) Home D) File

Computer Science & Information Technology

When performing a search, items that match the search term will be grouped into one of the following categories EXCEPT:

A) Settings. B) Files. C) Programs. D) Apps.

Computer Science & Information Technology