You are an ethical hacker contracted to conduct a security audit for a company. During the audit, you discover that the company's wireless network is using WEP encryption. You understand the vulnerabilities associated with WEP and plan to recommend a more secure encryption method. Which of the following would you recommend as a suitable replacement to enhance the security of the company's wireless network?
dobarb
8 months, 2 weeks agomultivolt
9 months, 2 weeks agoinsaniunt
9 months, 2 weeks ago