Podcast
Questions and Answers
What are two early security features used to keep wireless intruders out and protect data?
What are two early security features used to keep wireless intruders out and protect data?
SSID Cloaking and MAC Address Filtering
What is the purpose of SSID Cloaking?
What is the purpose of SSID Cloaking?
To disable the SSID beacon frame and require wireless clients to be manually configured with the SSID to connect to the network.
How does MAC Address Filtering work to control wireless access?
How does MAC Address Filtering work to control wireless access?
An administrator can manually permit or deny clients wireless access based on their physical MAC hardware address.
What is Open System Authentication and when is it typically used?
What is Open System Authentication and when is it typically used?
Signup and view all the answers
What are the four shared key authentication techniques available for securing WLANs?
What are the four shared key authentication techniques available for securing WLANs?
Signup and view all the answers
What encryption algorithm does WPA use to secure the data?
What encryption algorithm does WPA use to secure the data?
Signup and view all the answers
Which encryption protocol is used by WPA2?
Which encryption protocol is used by WPA2?
Signup and view all the answers
What are the two authentication methods available for WPA2 on home routers?
What are the two authentication methods available for WPA2 on home routers?
Signup and view all the answers
What are the two encryption protocols included in WPA and WPA2?
What are the two encryption protocols included in WPA and WPA2?
Signup and view all the answers
What does the Enterprise security mode choice for authentication require?
What does the Enterprise security mode choice for authentication require?
Signup and view all the answers
What is used to authenticate the AP with the RADIUS server in the Enterprise security mode?
What is used to authenticate the AP with the RADIUS server in the Enterprise security mode?
Signup and view all the answers
What does WPA3 - Personal use to thwart brute force attacks?
What does WPA3 - Personal use to thwart brute force attacks?
Signup and view all the answers
What does WPA3 - Enterprise use for authentication?
What does WPA3 - Enterprise use for authentication?
Signup and view all the answers
What does WPA3 - Open Networks use to encrypt all wireless traffic?
What does WPA3 - Open Networks use to encrypt all wireless traffic?
Signup and view all the answers
What is used to quickly onboard IoT devices in WPA3?
What is used to quickly onboard IoT devices in WPA3?
Signup and view all the answers
What is the recommended security protocol when WPA2 is no longer considered secure?
What is the recommended security protocol when WPA2 is no longer considered secure?
Signup and view all the answers