TELECOMMUNICATIONS SYSTEMS
COMMUNICATION WIRELESS COMPUTING DEVICES
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
WEP
|
|
WPA Personal
|
|
WPA Enterprise
|
|
WPA2 Personal
|
|
WPA2 Enterprise
|
Detailed explanation-1: -Which of the following wireless security methods uses a common shared key configured on the wireless access point and all wireless clients? WEP, WPA Personal, and WPA2 Personal //Shared key authentication can be used with WEP, WPA, and WPA2.
Detailed explanation-2: -WPA uses TKIP and WPA2 uses the AES algorithm.
Detailed explanation-3: -Encryption protocol The protocol used by WPA2, based on the Advanced Encryption Standard (AES) cipher along with strong message authenticity and integrity checking is significantly stronger in protection for both privacy and integrity than the RC4-based TKIP that is used by WPA.
Detailed explanation-4: -Deploying WPA2-Enterprise requires a RADIUS server, which handles the task of authenticating network users access. The actual authentication process is based on the 802.1x policy and comes in several different systems labelled EAP.
Detailed explanation-5: -When choosing from among WEP, WPA, WPA2 and WPA3 wireless security protocols, experts agree WPA3 is best for Wi-Fi security. As the most up-to-date wireless encryption protocol, WPA3 is the most secure choice. Some wireless APs do not support WPA3, however.