Which of the following wireless security technologies continuously supplies new keys for WEP?
A.
TKIP
B.
Mac filtering
C.
WPA2
D.
WPA
Explanation:
TKIP is a suite of algorithms that works as a “wrapper” to WEP, which allows users of legacy
WLAN equipment to upgrade to TKIP without replacing hardware. TKIP uses the original WEP
programming but “wraps” additional code at the beginning and end to encapsulate and modify it.