Multiple Choice
______________ is the process by which each end of the data flow proves that they are who they say they are.
A) Integrity
B) Confidentiality
C) Authentication
D) WTLS
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q22: _ is when an attacker uses Bluetooth
Q23: _ started with people using chalk on
Q24: Bluejacking is when an attacker uses Bluetooth
Q25: _ is a modulation type that spreads
Q26: 802.11 is the IEEE standard for wireless
Q28: Alert messages in Wireless Transport Layer Security
Q29: With any wireless protocol,which of the following
Q30: WAP uses _ for its encryption scheme.<br>A)WEP<br>B)SSL<br>C)WTLS<br>D)ElGamal
Q31: Which of the following specifications of 802.11
Q32: _ multiplexes or separates the data to