Which of the following wireless security technologies continuously supplies new keys for WEP?

A.
TKIP
B.
Mac filtering
C.
WPA2
D.
WPA
Explanation:
TKIP is a suite of algorithms that works as a “wrapper” to WEP, which allows users of legacy WLAN
equipment to upgrade to TKIP without replacing hardware. TKIP uses the original WEP programming but
“wraps” additional code at the beginning and end to encapsulate and modify it.
Incorrect Answers:
B: Networks can use MAC address filtering, only allowing devices with specific MAC addresses to connect
to a network. It does not continuously supply new keys for WEP.
C: WPA2 makes use of Counter Mode with Cipher Block Chaining Message Authentication Code Protocol
(CCMP) and is a more secure standard that WEP or WPA.
D: WPA replaces WEP, and also uses TKIP.http://www.howtogeek.com/192173/how-and-why-to-change-your-mac-address-on-windows-linux-andmac/
Dulaney, Emmett and Chuck Eastton, CompTIA Security+ Study Guide, 6th Edition, Sybex, Indianapolis,
2014, pp. 171, 172, 173