1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
netineya [11]
3 years ago
7

The security manager assigned a new security administrator the task of implementing secure protocols on all wireless access poin

ts. The new administrator chose Wi-Fi Protected Access (WPA) with Temporal Key Integrity Protocol (TKIP).
Was this a good choice or a poor choice, and why?
Computers and Technology
1 answer:
Agata [3.3K]3 years ago
5 0

Answer:

It was not a good choice and the administrator could have gone with a much better option.

Explanation:

Choosing WPA over WEP is a good option. It is however, still considered vulnerable despite its improved security and has been superseded by the WPA2 security protocol. TKIP is an example of an encryption method that was introduced around the same time with WPA and replaced WEP. This encryption is not secure and is now out of date and I would highly recommend against its use. If the access points support WPA2 – AES, then this would be the best and is the most optimal for wireless security.  

You might be interested in
Why is it important to enforce access controls and to keep logs regarding who has access to data closets
vlada-n [284]

Answer:

To ensure that in the event of a failure or breach, there is a record of when the equipment was accessed.

Explanation:

Hope this helps:)....if it don't then sorry for wasting your time and may God bless you:)

8 0
3 years ago
Read 2 more answers
What does this comparison block indicate?
natima [27]

Answer:

This comparison block indicates that the comparison is true if the left side is equal to the right side.

Explanation:

The comparison uses the = operator, which is the assignment operator in most programming languages. This operator is used to assign a value to a variable. In this case, the comparison is checking whether the value of the getItem variable is equal to 5. If the value of getItem is equal to 5, then the comparison will evaluate to true. If the value of getItem is not equal to 5, then the comparison will evaluate to false.

5 0
1 year ago
20 points fun challenge!!! Can u solve this challenge? Find the only spelled out word in this jumble of letters, there is only o
densk [106]

Answer:

hello

Explanation:

8 0
4 years ago
Read 2 more answers
What do you need to do in order get paid for ads running on your content?
OverLord2011 [107]
If you're talking about YouTube or platforms like that, you have to monetize your videos in the settings. However, if your video contains copyrighted content, you will most likely be banned or given a strike for copyright infringement. You can monetize videos that have absolutely no copyrighted music, pictures or videos
4 0
3 years ago
When powering up a home network, make sure all computers and peripherals are turned on before turning on the modem/router?
vazorg [7]
<span>the statement that when powering up a home network, make sure all computers and peripherals are turned on before turning on the modem/router is false.
The network devices like computers and other peripherals do not have to turned on before turning on the modem, they can be also later turned on.</span>
4 0
3 years ago
Other questions:
  • Which of the following statements about moving averages is not true?
    12·1 answer
  • He has a new Wi-Fi router that connects wirelessly to a new desktop and two new laptops, in addition to multiple smartphones, ta
    8·1 answer
  • PLEASE HELP TAKING A TEST!!!
    10·2 answers
  • What takes information entered into a given system and sends it automatically to all upstream systems and processes?
    6·2 answers
  • What advantage does digital storytelling have over oral storytelling traditions?
    6·1 answer
  • Which of the following is a trend in Internet computing? People are shifting back to using desktop computers more than mobile de
    5·2 answers
  • How do I select cells A3 through F3 in Excel 2013
    14·1 answer
  • Which examples demonstrate common qualifications for Marketing Information Management and Research careers? Check all that apply
    9·2 answers
  • How does one skip videos on edgenuit
    7·1 answer
  • Write a code segment that will store a dinner selection in option1 based on the values of rsvp and selection. The intended behav
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!