1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
netineya [11]
3 years ago
7

The security manager assigned a new security administrator the task of implementing secure protocols on all wireless access poin

ts. The new administrator chose Wi-Fi Protected Access (WPA) with Temporal Key Integrity Protocol (TKIP).
Was this a good choice or a poor choice, and why?
Computers and Technology
1 answer:
Agata [3.3K]3 years ago
5 0

Answer:

It was not a good choice and the administrator could have gone with a much better option.

Explanation:

Choosing WPA over WEP is a good option. It is however, still considered vulnerable despite its improved security and has been superseded by the WPA2 security protocol. TKIP is an example of an encryption method that was introduced around the same time with WPA and replaced WEP. This encryption is not secure and is now out of date and I would highly recommend against its use. If the access points support WPA2 – AES, then this would be the best and is the most optimal for wireless security.  

You might be interested in
A regular polygon is an n-sided polygon in which all sides are of the same length and all angles have the same degree (i.e.,the
butalik [34]

import java.util.Scanner;

public class polygon {

/** Main Method */

public static void main(String[] args) {

 Scanner input = new Scanner(System.in); // Create a Scanner

 // Prompt the user to enter the number of sides  

 // and the side of a regular polygon

 System.out.print("Enter the number of sides: ");

 int n = input.nextInt();

 System.out.print("Enter the side: ");

 double side = input.nextDouble();

 // Display the area of the regular polygon

 System.out.println("The area of the polygon is " + area(n, side));

}

/** Method area computes and returns the area of a regular polygon */

public static double area(int n, double side) {

 return (n * Math.pow(side, 2) / (4 * Math.tan(Math.PI / n)));

}

}

4 0
3 years ago
The options on the Ribbon will____:
IceJOKER [234]

replace both the traditional menu bar and toolbars.

Hopefully, It's Correct... (ノ◕ヮ◕)ノ

7 0
3 years ago
Which is a monthly cost associated with renting a house?
Evgesh-ka [11]
The answer is a. utility bills
8 0
3 years ago
Read 2 more answers
Help please, on tuesday we have oral presentation in zoom and i am afraid to speak in front of people, and i don't know what to
Lapatulllka [165]

Answer:

You should be strong, and be sure about what you want to say. Make sure when you speak it is clear, and makes sense.

Explanation:

If you don't speak up or sound like you know what you are talking about. I like to think of it as dancing. Act like you own the stage, or in your case, like you own the presentation. Also, I suggest you speak to your teacher in private, about him ignoring you. If I were you, I would look for newer friends. Ones that won't ignore you.

6 0
2 years ago
How might your use of computers and knowledge of technology systems affect your personal and professional success?
Xelga [282]
Amost all professions include theuse of computers. Knowing a lot about them and the way they work could help you use them when needed in a work environment. It would also make an employer more likely to hire you.
6 0
3 years ago
Read 2 more answers
Other questions:
  • Yahoo! allows users to create personalized my yahoo! pages. users can add or delete a variety of information from their personal
    8·2 answers
  • Which of the following sentences uses the correct verb tense?
    8·2 answers
  • What is the base for a hexadecimal number system?
    11·1 answer
  • Harrison works in a manufacturing unit and oversees the logistics, including the daily shipping of a large number of packages. W
    12·2 answers
  • What is "the last mile of broadband access"? Why is this a problem and what kind of impact does it have on the business world an
    9·1 answer
  • Premise: Tracy has a file that contains a list of actors and the movies in which they acted. She wants to know the top 3 ranked
    8·1 answer
  • A company is deploying NAFDs in its office to improve employee productivity when dealing with paperwork. Which of the following
    11·1 answer
  • Compare and contrast two fundamental security design principles in network security. Analyze how these principles and how they i
    15·1 answer
  • Write a Python program (rainfall.py) to collect data and calculate the average rainfall over a period of years. The program shou
    11·1 answer
  • when inserting a bibliography one choose from multiple ______ of bibliographies.[insert Bibliography]
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!