1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rashid [163]
3 years ago
12

To provide both encryption and integrity protection, wpa2 uses aes encryption with:

Computers and Technology
1 answer:
lara [203]3 years ago
3 0

WPA 2 stands for Wi-Fi Protected Access, version 2. It is the latest protocol that effectively protects 802.11 wireless traffic across a LAN. It belongs to the 802.11 protocol.

To provide both encryption and integrity protection, wpa2 uses aes encryption with Counter and CBC MAC (CCM) Mode.

You might be interested in
The OSI model is a useful tool in troubleshooting a network because it enables you to isolate a problem to a particular software
lutik1710 [3]

Answer:

1)  Layer 4, transport

2) Layer 2, datalink

3) Layer 5, session

4) Layer 7, application

Description of Problems are as below:

1) One of your servers has been exhibiting sluggish network performance. you use a network-monitoring program to try to evaluate the problem. You find considerable TCP retries occurring because the server is being overwhelmed by data, and packets are being discarded.

2) You check some statistics generated by a network-monitoring program and discovers that an abnormally high number of CRC errors were detected. (Hint think of the cause of CRC errors).

3) A user is trying to connect to another computer, but the logon attempt is continually rejected.

4) You try to access a Linux server to share files by using NFS. You can communicate with the server, but the shared files don't appear to be available.

Explanation:

OSI Model is a reference model to determine how applications communicate over a network. OSI consists of seven layers, and each layer performs a particular network function. The seven layers are:

   Layer 7 - Application.

   Layer 6 - Presentation.

   Layer 5 - Session.

   Layer 4 - Transport.

   Layer 3 - Network.

   Layer 2 - Data Link.

   Layer 1 - Physical.

1) One of your servers has been exhibiting sluggish network performance. you use a network-monitoring program to try to evaluate the problem. You find considerable TCP retries occurring because the server is being overwhelmed by data, and packets are being discarded.

Layer 4, transport

2) You check some statistics generated by a network-monitoring program and discovers that an abnormally high number of CRC errors were detected. (Hint think of the cause of CRC errors).

Layer 2, Data Link

3) A user is trying to connect to another computer, but the logon attempt is continually rejected.

Layer 5, session

4) You try to access a Linux server to share files by using NFS. You can communicate with the server, but the shared files don't appear to be available.

Layer 7, application

7 0
3 years ago
What an underlined word or phrase represents? (HTML AND CSS), has to be 9 letters long. kinda urgent
xz_007 [3.2K]

Answer:

hyperlink

Explanation:

Hyperlinks render as underlined by default, so that's my guess.

7 0
3 years ago
A programmer wants to write a procedure that calculates the net elevation - total number of feet a traveler goes up and down. Fo
ch4aika [34]

Answer:

Pseudocode

////////////////////////////////////////////////////////////////////////////////////////////////////////////

Integer netElevation(list of elements of type elevation - type and number)

<em>function open</em>

   Define running total = 0

   for each element from list

   <em>loop open</em>

       elevation type = element[i].type

      if (elevation type == Up)

           running total = running total + element[i].number

       else

           running total = running total - element[i].number

   <em>loop close</em>

   return running total

<em>function close</em>

3 0
3 years ago
Cual es la importancia de aplicar una riostra como punto de soporte en una estructura
creativ13 [48]

What is the importance of applying a brace as a support point in a structure is given in the following

Explanation:

  • So overall purpose of bracing is to provide additional safety against the external loads in comparable self-building. The main function of the bracing in steel structures that the lateral forces due to wind, earthquake and crane surge etc. are transmitted efficiently to the foundation of the building.
  • In construction, cross bracing is a system utilized to reinforce building structures in which diagonal supports intersect. Cross bracing can increase a building's capability to withstand seismic activity. Bracing is important in earthquake resistant buildings because it helps keep a structure standing.
  • A bracing system is a secondary but essential part of a bridge structure. A bracing system serves to stabilize the main girders during construction, to contribute to the distribution of load effects and to provide restraint to compression flanges or chords where they would otherwise be free to buckle laterally.
  • A bracing system is a secondary but essential part of a bridge structure. A bracing system serves to stabilize the main girders during construction, to contribute to the distribution of load effects and to provide restraint to compression flanges or chords where they would otherwise be free to buckle laterally.
7 0
3 years ago
To insert text in the background of a page, users should use a _____. page color watermark page border style
asambeis [7]

Answer:

Watermark

Explanation:

Almost all versions of Microsoft Word allow you to insert watermarks. Watermarks help users insert text and images that appear in the background of your Word document. These texts can sometimes appear as images or just plain text and are remarkable when used. The watermark option can be found under the design tab for newer versions of Word or the page layout tab in older versions

8 0
3 years ago
Other questions:
  • if i set my payment and use free trial on Scribd website, can i cancel my payment and NOT PAYING after one month??
    8·1 answer
  • A Game Object must have a Transform<br><br> True<br><br> False
    5·1 answer
  • Multiply 1101 and 0110 in binary.
    10·1 answer
  • Research and discuss the LAMP (Linux, Apache, MySQL, and PHP) architecture. What is the role of each layer of this software stac
    14·1 answer
  • Why should ERP architecture include a discussion on organizational structure, business processes, and people, instead of just in
    5·1 answer
  • A ____________ would be a misconfiguration of a system that allows the hacker to gain unauthorized access, whereas a____________
    12·1 answer
  • What is the name of the option in most presentation applications with which you can modify slide elements? The ( answer here )op
    9·1 answer
  • Clarissa is a computer programming consultant. When a client states that they have an extremely complex programming task, which
    10·2 answers
  • How many people on here are doing edmentum online
    11·1 answer
  • Please help me please please
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!