Wireless Encryption

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/11

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

12 Terms

1
New cards

What type of network is susceptible to tapping and listening by nearby devices?

Wireless networks are susceptible to tapping and listening.

2
New cards

What does WEP stand for?

Wired Equivalent Privacy.

3
New cards

What was WEP replaced with due to its vulnerabilities?

WPA, or Wi-Fi Protected Access.

4
New cards

What is the full form of WPA2?

Wi-Fi Protected Access version two.

5
New cards

What block cipher mode is associated with WPA2?

CCMP, which stands for Counter mode with Cipher Block Chaining Message Authentication Code Protocol.

6
New cards

What cryptographic method does WPA3 utilize for data confidentiality?

AES (Advanced Encryption Standard).

7
New cards

What is the integrity check method used in WPA3?

GMAC, which stands for Galois Message Authentication Code.

8
New cards

When was WPA2 introduced?

WPA2 was introduced in 2004.

9
New cards

What year was WPA3 introduced?

WPA3 was introduced in 2018.

10
New cards

What kind of authentication methods may be used to secure wireless networks?

Username, password, or multi-factor authentication.

11
New cards

What is the purpose of a message integrity check in wireless networks?

To verify that the information received is exactly the information that was originally sent.

12
New cards

What security methods should be considered for implementing security on wireless networks?

The highest level of security available in access points and client devices.