An administrator is implementing a wireless network. Which of the following encryption technologies is the MOST secure method and will authenticate devices to the network?
A.
SSH
B.
WEP
C.
VPN
D.
WPA
An administrator is implementing a wireless network. Which of the following encryption technologies is the MOST secure method and will authenticate devices to the network?
An administrator is implementing a wireless network. Which of the following encryption technologies is the MOST secure method and will authenticate devices to the network?
A.
SSH
B.
WEP
C.
VPN
D.
WPA