Which statement is true when comparing AES encryption to Triple DES (3DES)?
AES requires less CPU utilization and uses a larger block size than 3DES.
What is the best defense against fake access attacks?
Never use unsecured Wi-Fi hotspots.
An adminstrator fails to configure protection for usernames and passwords transmitted across the network.
Which component of the AAA model is weakened?
Authentication
A user is mistakenly granted access to customer accounts not required for his duties.
Which component of the AAA model is violated?
Authorization