The __________ replaces the cyclic redundancy check (CRC) and is designed to prevent
an attacker from capturing, altering, and resending a data packet.
a. Message Integrity Check (MIC)
b. Cyclic Redundancy Check 2 (CRC2)
c. Wi-Fi CRC
d. Wireless Parity Check (WPC)
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here