Podcast
Questions and Answers
What are two early security features used to keep wireless intruders out and protect data?
What are two early security features used to keep wireless intruders out and protect data?
SSID Cloaking and MAC Address Filtering
What is the purpose of SSID Cloaking?
What is the purpose of SSID Cloaking?
To disable the SSID beacon frame and require wireless clients to be manually configured with the SSID to connect to the network.
How does MAC Address Filtering work to control wireless access?
How does MAC Address Filtering work to control wireless access?
An administrator can manually permit or deny clients wireless access based on their physical MAC hardware address.
What is Open System Authentication and when is it typically used?
What is Open System Authentication and when is it typically used?
What are the four shared key authentication techniques available for securing WLANs?
What are the four shared key authentication techniques available for securing WLANs?
What encryption algorithm does WPA use to secure the data?
What encryption algorithm does WPA use to secure the data?
Which encryption protocol is used by WPA2?
Which encryption protocol is used by WPA2?
What are the two authentication methods available for WPA2 on home routers?
What are the two authentication methods available for WPA2 on home routers?
What are the two encryption protocols included in WPA and WPA2?
What are the two encryption protocols included in WPA and WPA2?
What does the Enterprise security mode choice for authentication require?
What does the Enterprise security mode choice for authentication require?
What is used to authenticate the AP with the RADIUS server in the Enterprise security mode?
What is used to authenticate the AP with the RADIUS server in the Enterprise security mode?
What does WPA3 - Personal use to thwart brute force attacks?
What does WPA3 - Personal use to thwart brute force attacks?
What does WPA3 - Enterprise use for authentication?
What does WPA3 - Enterprise use for authentication?
What does WPA3 - Open Networks use to encrypt all wireless traffic?
What does WPA3 - Open Networks use to encrypt all wireless traffic?
What is used to quickly onboard IoT devices in WPA3?
What is used to quickly onboard IoT devices in WPA3?
What is the recommended security protocol when WPA2 is no longer considered secure?
What is the recommended security protocol when WPA2 is no longer considered secure?