FUNDAMENTALS OF COMPUTER

TELECOMMUNICATIONS SYSTEMS

COMMUNICATION WIRELESS COMPUTING DEVICES

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Which of these security methods use a common shared key configured on the WAP and all wireless clients? (choose 3)
A
WEP
B
WPA Personal
C
WPA Enterprise
D
WPA2 Personal
E
WPA2 Enterprise
Explanation: 

Detailed explanation-1: -Which of the following wireless security methods uses a common shared key configured on the wireless access point and all wireless clients? WEP, WPA Personal, and WPA2 Personal //Shared key authentication can be used with WEP, WPA, and WPA2.

Detailed explanation-2: -WPA uses TKIP and WPA2 uses the AES algorithm.

Detailed explanation-3: -Encryption protocol The protocol used by WPA2, based on the Advanced Encryption Standard (AES) cipher along with strong message authenticity and integrity checking is significantly stronger in protection for both privacy and integrity than the RC4-based TKIP that is used by WPA.

Detailed explanation-4: -Deploying WPA2-Enterprise requires a RADIUS server, which handles the task of authenticating network users access. The actual authentication process is based on the 802.1x policy and comes in several different systems labelled EAP.

Detailed explanation-5: -When choosing from among WEP, WPA, WPA2 and WPA3 wireless security protocols, experts agree WPA3 is best for Wi-Fi security. As the most up-to-date wireless encryption protocol, WPA3 is the most secure choice. Some wireless APs do not support WPA3, however.

There is 1 question to complete.