header bg

Scan QR code or get instant email to install app

Question:

It has been questioned if the wireless network component of your network is sufficiently secure. A vulnerability scan of the wireless network reveals that an old encryption protocol that was designed to mimic wired encryption is being used. What encryption protocol is being used?

A WEP
explanation

Related Information

Comments

Leave a Reply

Your email address will not be published. Required fields are marked *

*