You are an ethical hacker contracted to conduct a security audit for a company. During the audit, you discover that the company's wireless network is using WEP encryption. You understand the vulnerabilities associated with WEP and plan to recommend a more secure encryption method. Which of the following would you recommend as a suitable replacement to enhance the security of the company's wireless network?
dobarb
1 year, 2 months agomultivolt
1 year, 3 months agoblehbleh
5 months, 2 weeks agoinsaniunt
1 year, 3 months ago