Which of the following wireless security technologies continuously supplies new keys for WEP?
TKIP is a suite of algorithms that works as a “wrapper” to WEP, which allows users of legacy WLAN equipment
to upgrade to TKIP without replacing hardware. TKIP uses the original WEP programming but “wraps”
additional code at the beginning and end to encapsulate and modify it.