A network technician is implementing new wireless access points in an existing wireless infrastructure. The security is the WPA 2 standard. Which of the following encryption methods may not be compatible with the previously installed access points?
A. TKIP
B. 3DES
C. AES
D. CHAP
Answer: C. AES
Computer Science & Information Technology
You might also like to view...
Cisco uses the term ________ to refer to a reinitialization of the software
A) Reload B) Reboot C) Reinitialize D) Refresh
Computer Science & Information Technology
Solve the following system using the substitution method or the linear combination method.
A.
B.
C.
D. infinite number of solutions
E. no solution
Computer Science & Information Technology