Which wireless encryption technology makes use of temporal keys?
Wireless Application Protocol (WAP)
Wifi Protected Access version 2 (WPA2)
Wireless Equivalence Protocol (WEP)
Extensible Authentication Protocol (EAP)
The process of identifying and classifying assets is typically included in the
Threat analysis process
Asset configuration management process
Business Impact Analysis
Disaster Recovery plan