COMPUTER THREATS SECURITY
WHAT IS COMPUTER SECURITY
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
Methods for securing a wireless network.
|
MAC Address filtering
|
|
Wi-Fi Protected Access (WPA)
|
|
Security tokens
|
|
Packet filtering
|
Explanation:
Detailed explanation-1: -The WPA Wi-Fi protocol is more secure than WEP, because it uses a 256-bit key for encryption, which is a major upgrade from the 64-bit and 128-bit keys used by the WEP system. WPA also uses the Temporal Key Integrity Protocol (TKIP), which dynamically generates a new key for each packet, or unit of data.
Detailed explanation-2: -WPA uses TKIP, which changes temporal keys after every 10, 000 packets and distributes the keys, thus improving security. Additionally, WPA uses a four-way handshake encryption protocol that ensures that the wireless client and access point can identify each other without sending a key.
Detailed explanation-3: -WPA uses TKIP and WPA2 uses the AES algorithm.
There is 1 question to complete.