Upon inspecting the wireless network within eccouncil video

 ·  PT1H46M27S  ·  EN

ethical-hacker video for upon inspecting the wireless network within your organization, it was discovered that the wireless network component lacks sufficient

Full Certification Question

Upon inspecting the wireless network within your organization, it was discovered that the wireless network component lacks sufficient security measures. It employs an outdated encryption protocol crafted to emulate wired encryption. Which of the following protocols is utilized in your organization's wireless network?