A network technician is implementing new wireless access points in an existing wireless infrastructure. The security is the WPA 2 standard. Which of the following encryption methods may not be compatible with the previously installed access points?

A. TKIP
B. 3DES
C. AES
D. CHAP

Answer: C. AES

Computer Science & Information Technology

You might also like to view...

Cisco uses the term ________ to refer to a reinitialization of the software

A) Reload B) Reboot C) Reinitialize D) Refresh

Computer Science & Information Technology

Solve the following system using the substitution method or the linear combination method.

A.
B.
C.
D. infinite number of solutions
E. no solution

Computer Science & Information Technology