FUNDAMENTALS OF COMPUTER

TELECOMMUNICATIONS SYSTEMS

COMMUNICATION WIRELESS COMPUTING DEVICES

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Which of the following wireless technologies are deprecated and should not be used due to their known vulnerabilities?
A
WPA2
B
WAF
C
WEP
D
None of the above
Explanation: 

Detailed explanation-1: -Wireless network security issues and threats spoofing and session hijacking-where the attacker gains access to network data and resources by assuming the identity of a valid user. eavesdropping-where unauthorised third parties intercept the data being transmitted over the secure network.

Detailed explanation-2: -Wireless networks are particularly vulnerable to attacks because it is difficult to prevent physical access to them. The only advantage they have in this respect is that an attacker must be in physical proximity to the network, which can limit the pool of potential attackers.

Detailed explanation-3: -RFID technology is the wireless use of electromagnetic fields to transfer data for the purposes of automatically identifying and tracking tags attached to objects.

Detailed explanation-4: -Which of the cryptographic algorithms listed below is the least vulnerable to attacks? The Advanced Encryption Standard (AES) is a symmetric-key block cipher algorithm and U.S. government standard for secure and classified data encryption and decryption.

There is 1 question to complete.