COMPUTER NETWORKING

WIRELESS NETWORKS AND MOBILE IP

WIRELESS NETWORKS

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Which of these security methods use a common shared key configured on the WAP and all wireless clients? (choose 3)
A
WEP
B
WPA Personal
C
WPA Enterprise
D
WPA2 Personal
E
WPA2 Enterprise
Explanation: 

Detailed explanation-1: -Which of the following wireless security methods uses a common shared key configured on the wireless access point and all wireless clients? WEP, WPA Personal, and WPA2 Personal //Shared key authentication can be used with WEP, WPA, and WPA2.

Detailed explanation-2: -The protocol used by WPA2, based on the Advanced Encryption Standard (AES) cipher along with strong message authenticity and integrity checking is significantly stronger in protection for both privacy and integrity than the RC4-based TKIP that is used by WPA. Among informal names are AES and AES-CCMP.

Detailed explanation-3: -When choosing from among WEP, WPA, WPA2 and WPA3 wireless security protocols, experts agree WPA3 is best for Wi-Fi security. As the most up-to-date wireless encryption protocol, WPA3 is the most secure choice.

Detailed explanation-4: -WPA2 uses the Advanced Encryption Standard (AES) which is also used by the U.S. government to protect classified documents. This is the strongest level of security you can provide for your home wifi network.

There is 1 question to complete.