Which authentication method is commonly used for more secure wireless networks quizlet?

Implemented as a replacement to Wired Equivalent Privacy (WEP).

Continued to use the flawed WEP Algorithm, however utilized Temporal Key Integrity Protocol (TKIP).

Uses the same algorithm as WEP (RC4).

Comes in two variants:

WPA-Personal (PSK) and WPA-Enterprise (802.1x)

An administrator is replacing a wireless router and the equipment connecting uses older legacy
equipment that was manufactured prior to 802.11i. WPA-TKIP (Temporal Key Integrity Protocol) would be the configuration settings to use in this scenario.

Recommended textbook solutions

Which authentication method is commonly used for more secure wireless networks quizlet?

Fundamentals of Database Systems

7th EditionRamez Elmasri, Shamkant B. Navathe

687 solutions

Which authentication method is commonly used for more secure wireless networks quizlet?

Introduction to Algorithms

3rd EditionCharles E. Leiserson, Clifford Stein, Ronald L. Rivest, Thomas H. Cormen

726 solutions

Which authentication method is commonly used for more secure wireless networks quizlet?

Service Management: Operations, Strategy, and Information Technology

7th EditionJames Fitzsimmons, Mona Fitzsimmons

103 solutions

Which authentication method is commonly used for more secure wireless networks quizlet?

Starting Out with C++ from Control Structures to Objects

9th EditionTony Gaddis

1,098 solutions

Upgrade to remove ads

Only SGD 41.99/year

  1. Other
  2. Computer Skills

  • Flashcards

  • Learn

  • Test

  • Match

  • Flashcards

  • Learn

  • Test

  • Match

Terms in this set (10)

You use a Windows notebook system that is a member of the domain on your network at work.
You need to configure the wireless network card in the system to connect to the wireless network at work. The connection should require a username and password for authentication using AES encryption.
Which type of security standard should you use while configuring the connection?

WPA2-Enterprise

Select the WPA2-Enterprise security standard for the wireless connection. WPA2 is required to support AES encryption. An Enterprise configuration (using either WPA or WPA2) authenticates using usernames, passwords, and 802.1x authentication. A RADIUS server is required for using 802.1x.

Which data transmission rate is defined by the IEEE 802.11b wireless standard?

11 Mbps

The IEEE 802.11b standard defines wireless transmission rates up to 11 Mbps.

The IEEE 802.3 standard defines Ethernet 10baseT cable-based transmissions of 10 Mbps.

The IEEE 802.11a standard defines wireless transmission rates up to 54 Mbps.

The IEEE 802.11n standard defines wireless transmission rates up to 100 Mbps.
References

You are designing a wireless network for a client. Your client needs the network to support a data rate of at least 54 Mbps. In addition, the client already has a wireless telephone system installed that operates at 2.4 GHz.
Which 802.11 standards can be used in this situation? (Select two.)

802.11n
802.11a

802.11a and 802.11n are both possible choices for this client. Both standards operate at 54 Mbps or higher (802.11n operates at 100 Mbps). Both standards also operate in the 5 GHz frequency range, which won't interfere with the phone system. (802.11n can be configured to operate in either the 2.4 GHz or the 5 GHz frequency ranges as needed.)

You want to implement 802.1x authentication on your wireless network. Which of the following will be required?

RADIUS

802.1x authentication uses user names and passwords, certificates, or devices such as smart cards to authenticate wireless clients. 802.1x authentication requires the following components:
A RADIUS server to centralize user account and authentication information. A centralized database for user authentication is required to allow wireless clients to roam between cells but authenticate using the same account information.
A PKI for issuing certificates. At a minimum, the RADIUS server must have a server certificate. To support mutual authentication, each client must also have a certificate.

Which of the following offers the weakest form of encryption for an 802.11 wireless network?

WEP

Which of the following wireless network methods make it easy for clients to find and connect to the wireless network?

802.1x
SSID broadcast
Shared secret key

Each access point has a Service Set ID (SSID), which identifies the wireless network. By default, access points broadcast the SSID to announce their presence and make it easy for clients to find and connect to the wireless network.

Which of the following measures will make your wireless network invisible to the casual attacker?

Disable the SSID broadcast

You want to connect a laptop computer running Windows to a wireless network. The wireless network uses multiple access points and is configured to use WPA2-Personal security. SSID broadcast has been disabled.
Which type of authentication method and encryption combination should you use for the strongest security possible?

A pre-shared key and AES encryption

To connect to the wireless network using WPA2-Personal, you need to use a pre-shared key for authentication. AES encryption is supported by WPA2 and is the strongest encryption method.

You want to connect your client computer to a wireless access point connected to your wired network at work. The network administrator tells you that the access point is configured to use WPA2-Personal with the strongest encryption method possible. SSID broadcast is turned off.
Which of the following must you configure manually on the client? (Select three.)

AES
Pre-shared key
SSID

WPA2-Personal uses a shared key for authentication. Once authenticated, dynamic keys are generated to be used for encryption. WPA2 supports AES and TKIP encryption. AES is the stronger encryption method of the two. With the SSID broadcast turned off, you need to manually configure the SSID on the client.

Uses Advanced Encryption Standard (AES) with a 128-bit key and a 48-bit initialization vector for encryption. It is more secure than TKIP.

You need to add security for your wireless network. You would like to use the most secure method.
Which method should you implement?

WPA2

WPA2 includes specifications for both encryption and authentication.

Sets with similar terms

quiz

45 terms

DueMender117

Network Pro Ch 6

20 terms

brianmiller77

Other sets by this creator

CH 3 Network and Computer Attacks

23 terms

Tiffany_Rossetto

Ch 2 TCP/IP Concepts

16 terms

Tiffany_Rossetto

ch 1- understand digital forensics

21 terms

Tiffany_Rossetto

Ethical Hacker Overview

16 terms

Tiffany_Rossetto

Other Quizlet sets

AP Gov Review Study Guide

60 terms

Audreykmcgee

(44) GERD

24 terms

haeunePLUS

Chapter 3 social studies Test

35 terms

burke1000PLUS

Washington State Quiz

24 terms

Sheila_Irish5TEACHER

Which authentication method is commonly used for more secure wireless networks?

WiFi Protected Access: WPA / WPA2 / WPA3 This authentication method uses different encryption algorithms to encrypt the transport. Therefore, this type of network cannot be forged easily, unlike open networks, and users get privacy. Today, WPA2 is probably the most commonly used method to secure WiFi networks.

Which encryption method is the most secure for a wireless network?

When choosing from among WEP, WPA, WPA2 and WPA3 wireless security protocols, experts agree WPA3 is best for Wi-Fi security. As the most up-to-date wireless encryption protocol, WPA3 is the most secure choice.

What is the best authentication method for wireless?

WPA2-Enterprise It is far and away the most secure of the common authentication types as each user must be onboarded and identified in the IDP. WPA2-Enterprise requires the use of a secure EAP method to authenticate. The most commonly used include PEAP-MSCHAPv2, EAP-TTLS/PAP, and EAP-TLS.

Which wireless security protocol is more secure quizlet?

This uses the modern WPA2 standard with older TKIP encryption. This isn't secure, and is only a good idea if you have older devices that can't connect to a WPA2-PSK (AES) network. This is the most secure option. It uses WPA2, the latest Wi-Fi encryption standard, and the latest AES encryption protocol.