Lisa, a network administrator, must implement a wireless security encryption protocol that supports the AES cipher. Which of the following should be implemented?
A.
WEP
B.
TKIP
C.
WPA2
D.
WPA Enterprise
Lisa, a network administrator, must implement a wireless security encryption protocol that supports the AES cipher. Which of the following should be implemented?
Lisa, a network administrator, must implement a wireless security encryption protocol that supports the AES cipher. Which of the following should be implemented?
A.
WEP
B.
TKIP
C.
WPA2
D.
WPA Enterprise