WEP and WPA are examples of ________

A) spam blockers
B) firewall applications (apps)
C) antivirus applications (apps)
D) protocols that use encryption to protect wireless transmissions

D

Computer Science & Information Technology

You might also like to view...

What are the four states for link styles that you can affect?

What will be an ideal response?

Computer Science & Information Technology

Because masking is so essential, it's important that you develop skills for using the ____ tool effectively.

A. Masking B. Brush C. Drawing D. Effects

Computer Science & Information Technology