Q: 2
Peter, a network defender, was instructed to protect the corporate network from unauthorized
access. To achieve this, he employed a security solution for wireless communication that uses
dragonfly key exchange for authentication, which is the strongest encryption algorithm that protects
the network from dictionary and key recovery attacks.
Identify the wireless encryption technology implemented in the security solution selected by Peter in
the above scenario.
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.