FUNDAMENTALS OF COMPUTER

TELECOMMUNICATIONS SYSTEMS

COMMUNICATION WIRELESS COMPUTING DEVICES

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
This wireless security method uses Advanced Encryption Standard (AES) and can use dynamic or pre-shared keys.
A
WPA2
B
TKIP
C
WEP
D
SSID
Explanation: 

Detailed explanation-1: -WPA2 replaces RC4 and TKIP with two stronger encryption and authentication mechanisms: Advanced Encryption Standard (AES), an encryption mechanism; and. Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP), an authentication mechanism.

Detailed explanation-2: -WPA uses TKIP and WPA2 uses the AES algorithm.

Detailed explanation-3: -In WPA2 Personal the users are authenticated using a pre-shared key (PSK), for that reason, it is also called WPA2-PSK. The WPA2 Personal uses the Advanced Encryption Standard (AES) for encryption.

Detailed explanation-4: -The protocol used by WPA2, based on the Advanced Encryption Standard (AES) cipher along with strong message authenticity and integrity checking is significantly stronger in protection for both privacy and integrity than the RC4-based TKIP that is used by WPA. Among informal names are AES and AES-CCMP.

Detailed explanation-5: -The Wi-Fi Alliance refers to their approved, interoperable implementation of the full 802.11i as WPA2, also called RSN (Robust Security). 802.11i makes use of the Advanced Encryption Standard (AES) block cipher, whereas WEP and WPA use the RC4 stream cipher.

There is 1 question to complete.