Implemented as a replacement to Wired Equivalent Privacy [WEP].
Continued to use the flawed WEP Algorithm, however utilized Temporal Key Integrity Protocol [TKIP].
Uses the same algorithm as WEP [RC4].
Comes in two variants:
WPA-Personal [PSK] and WPA-Enterprise [802.1x]
An administrator is replacing a wireless router and the equipment connecting uses older legacy
equipment that was manufactured prior to 802.11i. WPA-TKIP [Temporal Key Integrity
Protocol] would be the configuration settings to use in this scenario.
Fundamentals of Database Systems
7th EditionRamez Elmasri, Shamkant B. Navathe
687 solutions
Introduction to Algorithms
3rd EditionCharles E. Leiserson, Clifford Stein, Ronald L. Rivest, Thomas H. Cormen
726 solutions
Service Management: Operations, Strategy, and Information Technology
7th EditionJames Fitzsimmons, Mona Fitzsimmons
103 solutions
Starting Out with C++ from Control Structures to Objects
9th EditionTony Gaddis
1,098 solutions
Upgrade to remove ads
Only SGD 41.99/year
- Other
- Computer Skills
-
Flashcards
-
Learn
-
Test
-
Match
-
Flashcards
-
Learn
-
Test
-
Match
Terms in this set [10]
You use a Windows notebook system that is a member of the domain on your network at work.
You need to configure the wireless network card in the system to connect to the wireless network at work. The connection should require a username and password for authentication using AES encryption.
Which type of security standard
should you use while configuring the connection?
WPA2-Enterprise
Select the WPA2-Enterprise security standard for the wireless connection. WPA2 is required to support AES encryption. An Enterprise configuration [using either WPA or WPA2] authenticates using usernames, passwords, and 802.1x authentication. A RADIUS server is required for using 802.1x.
Which data transmission rate is defined by the IEEE 802.11b wireless standard?
11 Mbps
The IEEE 802.11b standard defines wireless transmission rates up to 11 Mbps.
The IEEE 802.3 standard defines Ethernet 10baseT cable-based transmissions of 10 Mbps.
The IEEE 802.11a standard defines wireless transmission rates up to 54 Mbps.
The IEEE 802.11n standard defines wireless transmission rates up to 100 Mbps.
References
You are designing a
wireless network for a client. Your client needs the network to support a data rate of at least 54 Mbps. In addition, the client already has a wireless telephone system installed that operates at 2.4 GHz.
Which 802.11 standards can be used in this situation? [Select two.]
802.11n
802.11a
802.11a and 802.11n are both possible choices for this client. Both standards operate at 54 Mbps or higher [802.11n operates at 100 Mbps]. Both standards also operate in the 5 GHz frequency range, which won't interfere with the phone system. [802.11n can be configured to operate in either the 2.4 GHz or the 5 GHz frequency ranges as needed.]
You want to implement 802.1x authentication on your wireless network. Which of the following will be required?
RADIUS
802.1x authentication uses user names and passwords, certificates, or devices such as smart cards to authenticate
wireless clients. 802.1x authentication requires the following components:
A RADIUS server to centralize user account and authentication information. A centralized database for user authentication is required to allow wireless clients to roam between cells but authenticate using the same account information.
A PKI for issuing certificates. At a minimum, the RADIUS server must have a server certificate. To support mutual authentication, each client must also have a certificate.
Which of the following offers the weakest form of encryption for an 802.11 wireless network?
WEP
Which of the following wireless network methods make it easy for clients to find and connect to the wireless network?
802.1x
SSID broadcast
Shared secret key
Each access point has a Service Set ID [SSID], which identifies the wireless network. By default, access points broadcast the SSID to announce their presence and make it easy for clients to find and connect to the wireless network.
Which of the following measures will make your wireless network invisible to the casual attacker?
Disable the SSID broadcast
You want to connect a laptop computer running Windows to a wireless network. The
wireless network uses multiple access points and is configured to use WPA2-Personal security. SSID broadcast has been disabled.
Which type of authentication method and encryption combination should you use for the strongest security possible?
A pre-shared key and AES encryption
To connect to the wireless network using WPA2-Personal, you need to use a pre-shared key for authentication. AES encryption is supported by WPA2 and is the strongest encryption method.
You want to connect your client computer to a wireless access point connected to your wired network at work. The network administrator tells you that the access point is configured to use WPA2-Personal with the strongest encryption method possible. SSID broadcast is turned off.
Which of the following must you configure manually on the client? [Select three.]
AES
Pre-shared key
SSID
WPA2-Personal uses a shared key for authentication. Once authenticated, dynamic keys are generated to be used for encryption. WPA2 supports AES and TKIP encryption. AES is the stronger encryption method of the two. With the SSID broadcast turned off, you need to manually configure the SSID on the client.
Uses Advanced Encryption Standard [AES] with a 128-bit key and a 48-bit initialization vector for encryption. It is more secure than TKIP.
You need to
add security for your wireless network. You would like to use the most secure method.
Which method should you implement?
WPA2
WPA2 includes specifications for both encryption and authentication.
Sets with similar termsquiz
45 terms
DueMender117
Network Pro Ch 6
20 terms
brianmiller77
Other sets by this creatorCH 3 Network and Computer Attacks
23 terms
Tiffany_Rossetto
Ch 2 TCP/IP Concepts
16 terms
Tiffany_Rossetto
ch 1- understand digital forensics
21 terms
Tiffany_Rossetto
Ethical Hacker Overview
16 terms
Tiffany_Rossetto
Other Quizlet setsAP Gov Review Study Guide
60 terms
Audreykmcgee
[44] GERD
24 terms
haeunePLUS
Chapter 3 social studies Test
35 terms
burke1000PLUS
Washington State Quiz
24 terms
Sheila_Irish5TEACHER