Matching
Match each term with the correct statement below.
Premises:
wireless device that requires secure network access
uses a passphrase that is manually entered to generate the encryption key
performs three steps on every block (128 bits) of plaintext
traffic sent to all users on the network
stores information from a device on the network so if a user roams away from an AP and later returns, she does not need to re-enter all of the credentials
encryption protocol in the 802.11i standard
solves the weak IV problem by rotating the keys frequently
robust security network
designed to prevent an attacker from capturing, altering, and resending data packets
Responses:
AES-CCMP
pre-shared key authentication
802.11i
key caching
Advanced Encryption Standard
broadcast
Message Integrity Check
supplicant
dynamic
Correct Answer:
Premises:
Responses:
wireless device that requires secure network access
uses a passphrase that is manually entered to generate the encryption key
performs three steps on every block (128 bits) of plaintext
traffic sent to all users on the network
stores information from a device on the network so if a user roams away from an AP and later returns, she does not need to re-enter all of the credentials
encryption protocol in the 802.11i standard
solves the weak IV problem by rotating the keys frequently
robust security network
designed to prevent an attacker from capturing, altering, and resending data packets
Premises:
wireless device that requires secure network access
uses a passphrase that is manually entered to generate the encryption key
performs three steps on every block (128 bits) of plaintext
traffic sent to all users on the network
stores information from a device on the network so if a user roams away from an AP and later returns, she does not need to re-enter all of the credentials
encryption protocol in the 802.11i standard
solves the weak IV problem by rotating the keys frequently
robust security network
designed to prevent an attacker from capturing, altering, and resending data packets
Responses:
Related Questions
Q32: Describe Kerberos.
Q33: Encryption under the WPA2 personal security model
Q34: The _ security model is designed for
Q35: _ was developed by the Massachusetts Institute
Q36: In WPA, _ encryption replaces WEP's small
Q37: A network supporting the 802.1x standard consists
Q38: What is the name of the 128-bit
Q39: Describe the 802.1x authentication procedure.
Q40: What is a wireless gateway?
Q41: What are the ways in which captive
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents