1/11
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
What type of network is susceptible to tapping and listening by nearby devices?
Wireless networks are susceptible to tapping and listening.
What does WEP stand for?
Wired Equivalent Privacy.
What was WEP replaced with due to its vulnerabilities?
WPA, or Wi-Fi Protected Access.
What is the full form of WPA2?
Wi-Fi Protected Access version two.
What block cipher mode is associated with WPA2?
CCMP, which stands for Counter mode with Cipher Block Chaining Message Authentication Code Protocol.
What cryptographic method does WPA3 utilize for data confidentiality?
AES (Advanced Encryption Standard).
What is the integrity check method used in WPA3?
GMAC, which stands for Galois Message Authentication Code.
When was WPA2 introduced?
WPA2 was introduced in 2004.
What year was WPA3 introduced?
WPA3 was introduced in 2018.
What kind of authentication methods may be used to secure wireless networks?
Username, password, or multi-factor authentication.
What is the purpose of a message integrity check in wireless networks?
To verify that the information received is exactly the information that was originally sent.
What security methods should be considered for implementing security on wireless networks?
The highest level of security available in access points and client devices.