1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
DedPeter [7]
4 years ago
10

Which encryption standard goes with the WPA2 protocol? AES DES TKIP WPS

Computers and Technology
1 answer:
zmey [24]4 years ago
6 0

Answer:

AES

Explanation:

WPA2 (Short for Wi-Fi Protected Access 2) this is the security method for wireless network, we could find other versions like WEP (Wired Equivalent Privacy) or WPA without the number 2, this method are obsolete because even regular people can decipher, the bigger change between WPA and WPA2 is the use of the AES encryption algorithm with CCMP instead of TKIP.

You might be interested in
You are an administrator of a growing network. You notice the network you have created is broadcasting, but you cannot ping syst
Nonamiya [84]

Answer:

Network bridge

Explanation:

You are an administrator of a growing network. You notice the network you have created is broadcasting but you cannot ping systems on different segments of your network. What device should you use to fix this issue?

✓ Network bridge

3 0
2 years ago
A(n) ________ collects data from various key business processes and stores the data in a single comprehensive data repository, u
xxTIMURxx [149]

Answer:

An Enterprise System

Explanation:

An enterprise system also refered to as an enterprise software is a computer software application used to handle the needs of a business or an enterprise examples are schools, production companies, government ministries and departments, charities etc.

The software provides all the business oriented services for the enterprise, services such as payment processing, students' information management, automated billing and payments etc.

Because enterprises will typically have different departments, the software is able to collect data from all the key business processes across all the departments into a single database which is useable according to different access privilages by all other parts of the enterprise.

3 0
3 years ago
Your company is planning to storage log data, crash dump files, and other diagnostic data for Azure VMs in Azure. The company ha
Serjik [45]

Answer: Azure Files

Explanation:

Azure Files simply offers file shares in the cloud which can be accessible through the Network File System (NFS) or Server Message Block (SMB) protocol.

Since the administrators must be able to browse to the data in File Explorer, access over SMB 3.0 must be supported and the storage must also support quotas, the Azure files will be useful in this regard.

7 0
3 years ago
__________ is software that comes hidden in free downloadable software that tracks online movements, mines the information store
denis23 [38]

Answer:

Spyware

Explanation:

Spyware is the software which is used to track the online movements, it also track the user action on the computer they are also called sneakware  or stealthware

  • This software is used  in the business purpose which it may be used in the office to track the record of employee in the working hours .
  • Spyware  software is used to track the information without knowing the user.

 

7 0
3 years ago
Whats the keyboard command that will allow you to copy text ?
mamaluj [8]

its ctrl c and to paste is ctrl v

8 0
3 years ago
Read 2 more answers
Other questions:
  • A restaurant has a case type that allows customer to book the dining room for events. Customers provide basic information includ
    11·1 answer
  • Consider two different implementations, M1 and M2, of the same instruction set. There are three classes of instructions (A, B, a
    14·1 answer
  • who will follow me on tiktok and like all my videos? if you do ill give branlist and give u a shoutout and you can enter my big
    15·1 answer
  • Please check my answer! (Java)
    6·1 answer
  • For this scenario related to turtle drawing, indicate whether it is better to write a loop or a function (or a set of functions)
    13·1 answer
  • What are two ways you can open an application?
    11·2 answers
  • There are many apps that help find you cheaper gas. If the cost of a gallon of regular gas is $3 at one station and $3.50 at ano
    15·1 answer
  • A security administrator is reviewing the following information from a file that was found on a compromised host: Which of the f
    9·1 answer
  • Consider the following method.
    14·1 answer
  • Heeeeeeeelp :)<br> thx<br> jfdyiusjmkdsuiho;dmcvrvho;j
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!