FUNDAMENTALS OF COMPUTER

COMPUTER THREATS SECURITY

TYPES OF NETWORK SECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
It is a wireless security protocol created by Cisco to address the weaknesses in WEP and WPA
A
LEAP
B
No Security
C
WPA
D
None of the above
Explanation: 

Detailed explanation-1: -Lightweight Extensible Authentication Protocol (LEAP): Also called EAP-Cisco, LEAP is a wireless security protocol created by Cisco to address the weaknesses in WEP and WPA.

Detailed explanation-2: -The WPA Wi-Fi protocol is more secure than WEP, because it uses a 256-bit key for encryption, which is a major upgrade from the 64-bit and 128-bit keys used by the WEP system. WPA also uses the Temporal Key Integrity Protocol (TKIP), which dynamically generates a new key for each packet, or unit of data.

Detailed explanation-3: -WPA. WPA (Wi-Fi Protected Access) was developed in 2003. It delivers stronger (128-/256-bit) encryption than WEP by using a security protocol known as Temporal Key Integrity Protocol (TKIP). Along with WPA2, WPA is the most common protocol in use today.

Detailed explanation-4: -Authentication used in WPA standard has also advanced in respect to one used in WEP. WPA uses 802.1x (EAP-based authentication) for authentication of the clients. In fact, this is the only weak point, where you may try your chances for breaking the WPA (and WPA2 in fact).

Detailed explanation-5: -WEP encrypts traffic using a 64-or 128-bit key in hexadecimal. This is a static key, which means all traffic, regardless of device, is encrypted using a single key. A WEP key allows computers on a network to exchange encoded messages while hiding the messages’ contents from intruders.

There is 1 question to complete.