You are implementing wireless access at a defense contractor. Specifications say, you must implement the AES Encryption algorithm. Which encryption standard should you choose?
Answer : C
Which of the following enables third-party developers to create capabilities to extend an application?
Answer : B
You are responsible for tech support at your company. Youhave been instructed to make certain that all desktops support file and folder encryption. Which file system should you use when installing Windows XP?
Answer : C
How many IEEE 1394 devices can be connected to a single IEEE 1394 port through daisy- chaining?
Answer : C