WEP and WPA are examples of ________
A) spam blockers
B) firewall applications (apps)
C) antivirus applications (apps)
D) protocols that use encryption to protect wireless transmissions
D
Computer Science & Information Technology
You might also like to view...
What are the four states for link styles that you can affect?
What will be an ideal response?
Computer Science & Information Technology
Because masking is so essential, it's important that you develop skills for using the ____ tool effectively.
A. Masking B. Brush C. Drawing D. Effects
Computer Science & Information Technology