Your company is implementing a wireless network and is concerned that someone from a competing company could stand outside the building and collect wireless data. You have assured the company that WPA2 is secure.
 
What makes WPA2 more secure than WPA?

A. AES
B. TKIP
C. RADIUS
D. TACACS

Answer: A

Computer Science & Information Technology

You might also like to view...

Is a Curves adjustment layer destructive or nondestructive?

What will be an ideal response?

Computer Science & Information Technology

All of the following are advantages of using named constants except

a. they can be used in the place of keywords. b. it is easier to make a consistent change throughout a program. c. they help make the program more self documenting. d. they’re useful for common values such as pi.

Computer Science & Information Technology