Which of the following technologies would be selected when looking to reduce a vulnerability to replay attacks by using 128-bit keys with a 48-bit initialization vector (IV)?
a. CCMP
b. WPA
c. WEP
d. ICMP
Answer: a. CCMP
Computer Science & Information Technology
You might also like to view...
In order to write data to a text file, you must create a file object using the ____________.
a. Text Reader class b. Text Writer class c. Stream Reader class d. Stream Writer class
Computer Science & Information Technology
The Network layer of the Internet, IP, is inherently an extremely reliable communication channel.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology