Wireless Security Settings

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

What is the name of the encryption protocol primarily used in Wi-Fi networks implementing the WPA3 security standard?

AES-GCMP (Advanced Encryption Standard with Galois Counter Mode)

What are the characteristic features of RADIUS?

-Primarily used for network access -Combines authentication and authorization -Encrypts only the password in the access-request packet

What are the characteristic features of WPA2/WPA3 Enterprise mode?

-Suitable for large corporate networks -IEEE(Institute of Electrical and Electronics Engineers) 802.1X -Requires RADIUS authentication server

Which of the following answers refers to a deprecated wireless authentication protocol developed by Cisco?

LEAP (Lightweight Extensible Authentication Protocol)

Which of the answers listed below refers to an open standard wireless network authentication protocol that enhances security by encapsulating authentication process within an encrypted TLS tunnel?

PEAP (Protected Extensible Authentication Protocol)

Which of the following answers refers to a security feature used in Bluetooth device pairing?

PIN

Which of the following acronyms refers to a client authentication method used in WPA3 Personal mode?

SAE (Simultaneous Authentication of Equals)

An SSID is a unique identifier (a.k.a. wireless network name) for a WLAN. Wireless networks advertise their presence by regularly broadcasting SSID in a special packet called beacon frame. In wireless networks with disabled security features, knowing the network SSID is enough to get access to the network. SSID also pinpoints the wireless router that acts as a WAP. Wireless routers from the same manufacturer are frequently configured with default (well-known) SSID names. Since multiple devices with the same SSID displayed on the list of available networks create confusion and encourage accidental access by unauthorized users (applies to networks that lack security), changing the default SSID is a recommended practice.

True

For a wireless client to be able to connect to a network, the security type (e.g., WEP, WPA, WPA2, or WPA3) and encryption type (e.g., TKIP or AES) settings on the connecting host must match the corresponding wireless security settings on a WAP.

True

Which of the wireless encryption schemes listed below offers the highest level of protection?

WPA3 (Wi-Fi Protected Access 3)

Which of the following solutions would offer the strongest security for a small network that lacks an authentication server?

WPA3-SAE (Wi-Fi Protected Access 3-Simultaneous Authentication of Equals)


Set pelajaran terkait

Ch. 18 -- Endocrine System -- Secondary Endocrine Organs

View Set

Computer Concepts and Applications Final

View Set

The Microscope: Exercise 3 Pre lab Quiz

View Set

Digital Imaging: Photoshop: Chapter 1

View Set

Geography chapter 5 Russia and the Post-Soviet States

View Set

PMI Project Management Professional (PMP) Exam

View Set

monday.com Core Builder Certification

View Set

Chapter 56: Acute Intracranial Problems

View Set