Matching
Match each term with the correct statement below.
Premises:
wireless device that requires secure network access
uses a passphrase that is manually entered to generate the encryption key
performs three steps on every block (128 bits) of plaintext
traffic sent to all users on the network
stores information from a device on the network so if a user roams away from an AP and later returns, she does not need to re-enter all of the credentials
encryption protocol in the 802.11i standard
solves the weak IV problem by rotating the keys frequently
robust security network
designed to prevent an attacker from capturing, altering, and resending data packets
Responses:
AES-CCMP
pre-shared key authentication
802.11i
key caching
Advanced Encryption Standard
broadcast
Message Integrity Check
supplicant
dynamic
Correct Answer:
Premises:
Responses:
wireless device that requires secure network access
uses a passphrase that is manually entered to generate the encryption key
performs three steps on every block (128 bits) of plaintext
traffic sent to all users on the network
stores information from a device on the network so if a user roams away from an AP and later returns, she does not need to re-enter all of the credentials
encryption protocol in the 802.11i standard
solves the weak IV problem by rotating the keys frequently
robust security network
designed to prevent an attacker from capturing, altering, and resending data packets
Premises:
wireless device that requires secure network access
uses a passphrase that is manually entered to generate the encryption key
performs three steps on every block (128 bits) of plaintext
traffic sent to all users on the network
stores information from a device on the network so if a user roams away from an AP and later returns, she does not need to re-enter all of the credentials
encryption protocol in the 802.11i standard
solves the weak IV problem by rotating the keys frequently
robust security network
designed to prevent an attacker from capturing, altering, and resending data packets
Responses:
Related Questions
Q14: In dynamic WEP, the _ key is
Q15: What should a business do if the
Q16: The _ wireless security standard provides a
Q17: Pre-shared key (PSK) authentication uses a passphrase
Q18: At the heart of a WIDS are
Q20: _ is considered to be the "heart
Q21: The 802.11i standard addresses both _.<br>A) encryption
Q22: How long is the per-packet key used
Q23: WPA authentication can be accomplished by using
Q24: Describe the 802.1x authentication procedure.