Which of the following is an encryption method of wireless LAN?
WPA2
Q34. Which of the following is the most appropriate as a set of documents that
comprehensively define the approach to information security of a company or an
organization, sometimes including information security standards?
a) Information security policy