Matching
Match each item with an statement below:
Premises:
allows a company to maintain user profiles in a central database that all remote servers can share.
subset of 802.11i that addresses both encryption and authentication.
allows a device to become authenticated to an AP before moving into range of the AP.
second generation of WPA security.
encryption protocol in the 802.11i standard.
"leases" IP addresses to clients to use while they are connected to the network.
manipulates an entire block of text at one time.
intended for settings in which an authentication server is unavailable.
designed for medium to large-sized organizations such as businesses, government agencies, and universities.
Responses:
Personal security model
Block cipher
Pre-authentication
AES-CCMP
DHCP
RADIUS
WPA
WPA2
Enterprise security model
Correct Answer:
Premises:
Responses:
allows a company to maintain user profiles in a central database that all remote servers can share.
subset of 802.11i that addresses both encryption and authentication.
allows a device to become authenticated to an AP before moving into range of the AP.
second generation of WPA security.
encryption protocol in the 802.11i standard.
"leases" IP addresses to clients to use while they are connected to the network.
manipulates an entire block of text at one time.
intended for settings in which an authentication server is unavailable.
designed for medium to large-sized organizations such as businesses, government agencies, and universities.
Premises:
allows a company to maintain user profiles in a central database that all remote servers can share.
subset of 802.11i that addresses both encryption and authentication.
allows a device to become authenticated to an AP before moving into range of the AP.
second generation of WPA security.
encryption protocol in the 802.11i standard.
"leases" IP addresses to clients to use while they are connected to the network.
manipulates an entire block of text at one time.
intended for settings in which an authentication server is unavailable.
designed for medium to large-sized organizations such as businesses, government agencies, and universities.
Responses:
Related Questions
Q30: What are the steps involved in the
Q31: When should you use the transitional security
Q32: When using the transitional security model, open
Q33: PSK keys are automatically authenticated between devices
Q34: PSK requires that a key (also called
Q36: The _ model is used as a
Q37: What are the main characteristics of the
Q38: AES is designed to be an encryption
Q39: Briefly describe the history of AES.
Q40: The _ in an 802.1x configuration stores