A security administrator must implement a wireless encryption system to secure mobile
devices’ communication. Some users have mobile devices which only support 56-bit
encryption. Which of the following wireless encryption methods should be implemented?
A.
RC4
B.
AES
C.
MD5
D.
TKIP