Which algorithm is this referring to?

Posted by: Pdfprep Category: 312-50v9 Tags: , ,

In 2007, this wireless security algorithm was rendered useless by capturing packets and discovering the passkey in a matter of seconds. This security flaw led to a network invasion of TJ Maxx and data theft through a technique known wardriving.

Which algorithm is this referring to?
A . Wired Equivalent Privacy (WEP)
B . Temporal Key Integrity Protocol (TRIP)
C . Wi-Fi Protected Access (WPA)
D . Wi-Fi Protected Access 2(WPA2)

Answer: A

Leave a Reply

Your email address will not be published.