COMPUTER FUNDAMENTALS

COMPUTER ETHICS AND SECURITY

CRYPTOGRAPHY AND ENCRYPTION

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
While setting up a wireless corporate network, which of following should an administrator avoid implementing
A
EAP-TLS
B
PEAP
C
WEP
D
WPA
Explanation: 

Detailed explanation-1: -WEP (Wired Equivalent Privacy) is the oldest and most common Wi-Fi security protocol. It was the privacy component established in the IEEE 802.11, a set of technical standards that aimed to provide a wireless local area network (WLAN) with a comparable level of security to a wired local area network (LAN).

Detailed explanation-2: -A firewall should be implemented between the wireless network and the internal network infrastructure (wired).

Detailed explanation-3: -Which wireless authentication method provides the highest level of security? WPA aims to provide stronger wireless data encryption than WEP. Wi-Fi Protected Access (WPA) is a security protocol and security certification program developed by the Wi-Fi Alliance to secure wireless computer networks.

Detailed explanation-4: -Change default passwords. Restrict access. Encrypt the data on your network. Protect your Service Set Identifier (SSID). Install a firewall. Maintain antivirus software. Use file sharing with caution. Keep your access point software patched and up to date. More items •01-Feb-2021

There is 1 question to complete.