ethical-hacker video for upon inspecting the wireless network within your organization, it was discovered that the wireless network component lacks sufficient
Upon inspecting the wireless network within your organization, it was discovered that the wireless network component lacks sufficient security measures. It employs an outdated encryption protocol crafted to emulate wired encryption. Which of the following protocols is utilized in your organization's wireless network?