Podcast
Questions and Answers
Which encryption cipher is used in WPA2 to replace RC4?
Which encryption cipher is used in WPA2 to replace RC4?
- WEP
- AES (correct)
- TKIP
- CCMP
What is the main problem with unencrypted wireless traffic?
What is the main problem with unencrypted wireless traffic?
- Weak encryption
- Replay attacks
- Unauthorized use of the network
- Interception of data (correct)
Which version of WPA was designed to fix vulnerabilities in the WEP standard?
Which version of WPA was designed to fix vulnerabilities in the WEP standard?
- WPA2
- WPA2-TKIP
- WPA (correct)
- WEP
Which protocol is often used to authenticate connections by wireless and VPN users?
Which protocol is often used to authenticate connections by wireless and VPN users?
What does the supplicant do during the EAP session?
What does the supplicant do during the EAP session?
Which component is responsible for creating an encrypted tunnel for the supplicant to send credentials securely?
Which component is responsible for creating an encrypted tunnel for the supplicant to send credentials securely?
Which protocol allows a user account to authenticate to a domain controller (DC) over a trusted local cabled segment?
Which protocol allows a user account to authenticate to a domain controller (DC) over a trusted local cabled segment?
Which mechanism does WPA3 use to replace the vulnerable 4-way handshake in WPA2?
Which mechanism does WPA3 use to replace the vulnerable 4-way handshake in WPA2?
What is the main purpose of using encryption for management frames in WPA3?
What is the main purpose of using encryption for management frames in WPA3?
What is the main difference between WPA2 pre-shared key (PSK) authentication and WPA3 simultaneous authentication of equals (SAE)?
What is the main difference between WPA2 pre-shared key (PSK) authentication and WPA3 simultaneous authentication of equals (SAE)?
What is the recommended length for a passphrase in WPA2 to mitigate risks from cracking?
What is the recommended length for a passphrase in WPA2 to mitigate risks from cracking?
Which of the following is a disadvantage of using personal authentication for wireless networks?
Which of the following is a disadvantage of using personal authentication for wireless networks?
What is the advantage of using EAP for enterprise authentication?
What is the advantage of using EAP for enterprise authentication?
Which statement about EAP-TLS is true?
Which statement about EAP-TLS is true?
What is the purpose of the AAA server in the enterprise authentication workflow?
What is the purpose of the AAA server in the enterprise authentication workflow?