Multiple Choice
____ authentication is used in the enterprise security model using WPA and WPA2.
A) AES
B) TKIP
C) IEEE 802.1x
D) All of the above
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q6: Describe the Temporal Key Integrity Protocol used
Q7: WEP2 attempted to overcome the limitations of
Q7: In WPA, _ encryption replaces WEP's small
Q8: _ was designed to address WEP vulnerabilities
Q9: The block cipher used in 802.11i is
Q12: A network supporting the 802.1x standard consists
Q13: Most consumer access points are in reality
Q14: In dynamic WEP, the _ key is
Q15: What should a business do if the
Q16: The _ wireless security standard provides a