FUNDAMENTALS OF COMPUTER

TELECOMMUNICATIONS SYSTEMS

COMMUNICATION WIRELESS COMPUTING DEVICES

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
With this authentication, clients and APs are configured a secret or passphrase.
A
Open
B
802.1x
C
802.11
D
Shared Key
Explanation: 

Detailed explanation-1: -Shared Key Authentication (SKA) is a verification process by which a computer can gain access to a wireless network that uses the Wired Equivalent Privacy (WEP) protocol. With SKA, a computer equipped with a wireless modem can fully access any WEP network and exchange encrypted or unencrypted data.

Detailed explanation-2: -For secret key authentication to work, the two parties to a transaction must share a cryptographic session key which is also secret, known only to them and to no others. The key is symmetric; that is, it is a single key used for both encryption and decryption.

Detailed explanation-3: -With OSA’s open authentication method, any device can communicate with the access point, whereas SKA devices must use a WEP key for authentication. However, SKA uses a simple challenge-response protocol. As such, it is vulnerable to dictionary attacks and potential damage to WEP keys.

Detailed explanation-4: -Open authentication is used with wireless networks. Pre-shared keys are used with wired networks. Pre-shared keys require an encrypted secret word. Open authentication does not require a secret word.

There is 1 question to complete.