Posted by: Pdfprep
Post Date: December 24, 2020
What are three primary components that describe TKIP? (Choose three.)
A . broadcast key rotation
B . dynamic WEP
C . message integrity check
D . per-packet key hashing
E . symmetric key cipher
F . WPA2 enterprise mode
Answer: ACD
Explanation:
TKIP uses the same underlying mechanism as WEP, and consequently is vulnerable to a number of similar attacks. The message integrity check, per- packet key hashing, broadcast key rotation, and a sequence counter discourage many attacks. The key mixing function also eliminates the WEP key recovery attacks.
http://en.wikipedia.org/wiki/Temporal_Key_Integrity_Protocol