Which of the following technologies would be selected when looking to reduce a vulnerability to replay attacks by using 128-bit keys with a 48-bit initialization vector (IV)?

a. CCMP
b. WPA
c. WEP
d. ICMP

Answer: a. CCMP

Computer Science & Information Technology

You might also like to view...

In order to write data to a text file, you must create a file object using the ____________.

a. Text Reader class b. Text Writer class c. Stream Reader class d. Stream Writer class

Computer Science & Information Technology

The Network layer of the Internet, IP, is inherently an extremely reliable communication channel.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology