A company requires that all wireless communication be compliant with the Advanced encryption standard. The current wireless infrastructure implements WEP + TKIP. Which of the following wireless protocols should be implemented?

A. Incident identification
B. Implement mitigation
C. Chain of custody
D. Capture system image

Answer: B. Implement mitigation

Computer Science & Information Technology

You might also like to view...

What are the steps undertaken by an initiator in order to connect to an iSCSI target?

What will be an ideal response?

Computer Science & Information Technology

A ____ is a device used to convert a hard copy image into a digital form for storage, retrieval, or other electronic purposes.

a. digital camera b. fax machine c. scanner d. all of the above

Computer Science & Information Technology