FUNDAMENTALS OF COMPUTER

COMPUTER THREATS SECURITY

WHAT IS COMPUTER SECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Methods for securing a wireless network.
A
MAC Address filtering
B
Wi-Fi Protected Access (WPA)
C
Security tokens
D
Packet filtering
Explanation: 

Detailed explanation-1: -The WPA Wi-Fi protocol is more secure than WEP, because it uses a 256-bit key for encryption, which is a major upgrade from the 64-bit and 128-bit keys used by the WEP system. WPA also uses the Temporal Key Integrity Protocol (TKIP), which dynamically generates a new key for each packet, or unit of data.

Detailed explanation-2: -WPA uses TKIP, which changes temporal keys after every 10, 000 packets and distributes the keys, thus improving security. Additionally, WPA uses a four-way handshake encryption protocol that ensures that the wireless client and access point can identify each other without sending a key.

Detailed explanation-3: -WPA uses TKIP and WPA2 uses the AES algorithm.

There is 1 question to complete.