Top Posters
Since Sunday
a
5
k
5
c
5
B
5
l
5
C
4
s
4
a
4
t
4
i
4
r
4
r
4
New Topic  
garrettl24 garrettl24
wrote...
Posts: 100
Rep: 0 0
2 years ago
Which one of the following is the data encryption and integrity method used by WPA2?

▸ CCMP

▸ GCMP

▸ TKIP

▸ WIPS
Textbook 
Official Cert Guide: CCNA 200-301

Official Cert Guide: CCNA 200-301


Edition: 1st
Author:
Read 122 times
1 Reply
Replies
Answer verified by a subject expert
FreddyK10FreddyK10
wrote...
Posts: 74
Rep: 1 0
2 years ago
Sign in or Sign up in seconds to unlock everything for free
More solutions for this book are available here
1

Related Topics

garrettl24 Author
wrote...

2 years ago
Thanks
wrote...

Yesterday
Brilliant
wrote...

2 hours ago
this is exactly what I needed
New Topic      
Explore
Post your homework questions and get free online help from our incredible volunteers
  1053 People Browsing
Related Images
  
 108
  
 106
  
 238
Your Opinion
Who's your favorite biologist?
Votes: 586