Watch this video on YouTube
Which encryption technique will best protect a wireless network from a man-in-the-middle attack?