1/6
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
How can we secure an organization’s wireless network since it can have confidential information on it?
Authenticate the users before giving them access, ensure that all communicate is confidential, and verify the integrity of all communication.
What is Wire-Equivalent Privacy (WEP)?
Early security protocol that has a cryptographic vulnerability.
What is Wi-Fi Protected Access (WPA)?
Short-term bridge between WEP and whatever the successor would be.
What is WPA2?
Replacement for WPA.
What does WPA2 use?
CCMP block cipher mode, combining AES encryption and MIC integrity with CBC-MAC.
What is WPA3?
The most up-to-date version of WPA.
What does WPA3 use?
Uses the GCMP block cipher mode, having data confidentiality with AES and integrity with MIC and GMAC.