ECCouncil Network Defense Essentials (NDE) Exam 112-51 Question # 20 Topic 3 Discussion

ECCouncil Network Defense Essentials (NDE) Exam 112-51 Question # 20 Topic 3 Discussion

112-51 Exam Topic 3 Question 20 Discussion:
Question #: 20
Topic #: 3

Peter, a network defender, was instructed to protect the corporate network from unauthorized access. To achieve this, he employed a security solution for wireless communication that uses dragonfly key exchange for authentication, which is the strongest encryption algorithm that protects the network from dictionary and key recovery attacks.

Identify the wireless encryption technology implemented in the security solution selected by Peter in the above scenario.


A.

WPA


B.

WPA3


C.

EAP


D.

WEP


Get Premium 112-51 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.