WPA2
Wi-Fi Protected Access 2 (WPA2) adheres to the ____ specifications.
802.11i
You can also enable ___ on your wireless connections to provide data transmission encryption.
IPsec
It is built upon the idea of
Robust Secure Networks (RSN).
WPA2 uses what for data integrity?
Uses Cipher Block Chaining Message Authentication Code (CBC-MAC) for data integrity applied to both the data and the header.
Like WPA, it resolves the weaknesses inherent in
WEP and is intended to replace both WEP and WPA.
WPA2 has the same advantages as
WPA and WEP
WPA2 supports
dynamic key generation and rotation through CCMP.
WPA2 supports both
pre-shared key (referred to as WPA2-PSK or WPA2 Personal) and 802.1x (referred to as WPA2 Enterprise) authentication.
WPA2 uses what for encryption?
•Uses Advanced Encryption Standard (AES) with either TKIP or Counter Mode with CBC-MAC Protocol (CCMP), also known as AES-CCMP. AES-CCMP is a strong encryption method and provides a high level of security.