TELECOMMUNICATIONS SYSTEMS
COMMUNICATION WIRELESS COMPUTING DEVICES
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Shared Key
|
|
Open
|
|
802.1x
|
|
Secured
|
Detailed explanation-1: -Open authentication requires that clients provide a MAC address in order to connect to the wireless network.-You can use open authentication to allow any wireless client to connect to an access point. Open authentication is typically used on public networks.
Detailed explanation-2: -Extensible Authentication Protocol (EAP) This protocol supports many types of authentication, from one-time passwords to smart cards. When used for wireless communications, EAP is the highest level of security as it allows a given access point and remote device to perform mutual authentication with built-in encryption.
Detailed explanation-3: -Open System Authentication (OSA) is a process by which a computer can gain access to a wireless network that uses the Wired Equivalent Privacy (WEP) protocol. With OSA, a computer equipped with a wireless modem can access any WEP network and receive files that are not encrypted.
Detailed explanation-4: -PEAP is a popular method for wireless authentication. You only need a certificate for the authentication server, not on the wireless clients. This makes it quite easy to implement PEAP.