Which of the following encryption methods is considered easily broken and should be avoided when configuring wireless security?
A. WEP
B. WPA
C. AES
D. TKIP
Answer: A. WEP
Computer Science & Information Technology
You might also like to view...
The option to save a presentation in PDF file format is an Export option located on the ________ tab
A) Slide Show B) Insert C) Home D) File
Computer Science & Information Technology
When performing a search, items that match the search term will be grouped into one of the following categories EXCEPT:
A) Settings. B) Files. C) Programs. D) Apps.
Computer Science & Information Technology