Deck 9: Implementing Wireless Lan Security

ملء الشاشة (f)
exit full mode
سؤال
WPA authentication can be accomplished by using either IEEE 802.1x or pre-shared key (PSK) technology.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Within the IEEE 802.1x standard, ____ ensures that a device (wired or wireless) that requests access to the network is prevented from receiving any traffic until its identity can be verified.

A) an access control list
B) port security
C) port scanning
D) port blocking
سؤال
The block cipher used in 802.11i is the Data Encryption Standard (DES).
سؤال
How long is the per-packet key used in TKIP?

A) 40-bits
B) 64-bits
C) 128-bits
D) 256-bits
سؤال
A virtual private network (VPN) uses a public, unsecured network as if it were a private, secured network.
سؤال
____ was designed to address WEP vulnerabilities with a minimum of inconvenience.

A) IEEE 802.11i
B) TGi
C) dynamic WEP
D) WPA
سؤال
The ____ wireless security standard provides a low level of security.

A) Dynamic WEP
B) WEP
C) WEP2
D) All of the above
سؤال
What authentication system did the proposed WEP2 standard use?

A) Kerberos
B) AES-CCMP
C) dynamic WEP
D) key caching
سؤال
Pre-shared key (PSK) authentication uses a passphrase that is automatically generated to generate the encryption key.
سؤال
Within Step 2 of Advanced Encryption Standard (AES), multiple iterations (called rounds) are performed depending upon the key size: 128-bit key performs 9 rounds, a 192-bit key performs 11 rounds, and a 256-bit key uses ____ rounds.

A) 13
B) 15
C) 17
D) 19
سؤال
What security technology was most recently introduced?

A) WPA
B) WPA2
C) WEP2
D) Dynamic WEP
سؤال
____ replaces CRC in WPA.

A) MIC
B) MRC
C) CMR
D) CMC
سؤال
What feature of IEEE 802.11i allows a device to become authenticated to an AP before moving to it?

A) key caching
B) port security
C) pre-authentication
D) message passing
سؤال
The personal security model is intended for settings in which a(n) ____ is unavailable.

A) wired network
B) authentication server
C) AP
D) intermediate security model
سؤال
The 802.11i standard addresses both ____.

A) encryption and confidentiality
B) integrity and confidentiality
C) authentication and direction
D) encryption and authentication
سؤال
In dynamic WEP, the ____ key is changed every time the user roams to a new AP or logs out and logs back in.

A) broadcast
B) unicast
C) passphrase
D) ticket
سؤال
WEP2 attempted to overcome the limitations of WEP by adding two new security enhancements.
سؤال
The ____ method of encryption is used in a personal security model.

A) PSK
B) WEP
C) TKIP
D) MAC
سؤال
When implementing an interim security model, most vendors have the option of a 128-bit WEP key, which can be created by entering 16 ____ characters. This provides the most secure option.

A) ASCII
B) ciphered
C) hexadecimal
D) plaintext
سؤال
What is the first step in implementing an interim security model?

A) shared key authentication
B) port security
C) turning off SSID beaconing
D) MAC address filtering
سؤال
Describe Advanced Encryption Standard (AES).
سؤال
Describe pre-shared key authentication.
سؤال
____ is considered to be the "heart and soul" of WPA security.

A) PSK
B) IV
C) MIC
D) TKIP
سؤال
At the heart of a WIDS are ____; these devices, which can be either separate hardware devices or a standard access point operating in a special "scan" mode, monitor the airwaves to detect signals from rogue access points.

A) captive portals
B) VPNs
C) firewalls
D) wireless sensors
سؤال
The ____________________ security model is designed for medium to large-size organizations such as businesses, government agencies, and universities.
سؤال
What should a business do if the best possible security model cannot be implemented?
سؤال
Temporal Key Integrity Protocol (TKIP) has three major components to address vulnerabilities. List and describe them.
سؤال
A ____ VPN is a user-to-LAN connection used by remote users.

A) remote-access
B) site-to-site
C) peer-to-peer
D) remote-to-LAN
سؤال
Most consumer access points are in reality wireless ____________________, because they combine the functions of an access point, router, network address translator, firewall, and switch.
سؤال
Describe the Temporal Key Integrity Protocol used by Wi-Fi Protected Access (WPA).
سؤال
____ authentication is used in the enterprise security model using WPA and WPA2.

A) AES
B) TKIP
C) IEEE 802.1x
D) All of the above
سؤال
Describe Kerberos.
سؤال
Encryption under the WPA2 personal security model is accomplished by using the block cipher ____.

A) TKIP
B) AES
C) PSK
D) CBC
سؤال
The ____________________ security model is designed for single users or small office home office (SOHO) settings of generally 10 or fewer wireless devices.
سؤال
____________________ was developed by the Massachusetts Institute of Technology (MIT) and used to verify the identity of network users.
سؤال
In WPA, ________________________________________ encryption replaces WEP's small 40-bit encryption key that must be manually entered on wireless APs and devices and does not change.
سؤال
A network supporting the 802.1x standard consists of three elements. Identify and describe each one.
سؤال
What is the name of the 128-bit key used in TKIP?

A) temporal key
B) MIC
C) XOR
D) PRNG
سؤال
Describe the 802.1x authentication procedure.
سؤال
What is a wireless gateway?
سؤال
What are the ways in which captive portals are used?
سؤال
Match between columns
wireless device that requires secure network access
key caching
wireless device that requires secure network access
802.11i
wireless device that requires secure network access
Message Integrity Check
wireless device that requires secure network access
dynamic
wireless device that requires secure network access
AES-CCMP
wireless device that requires secure network access
pre-shared key authentication
wireless device that requires secure network access
broadcast
wireless device that requires secure network access
Advanced Encryption Standard
wireless device that requires secure network access
supplicant
uses a passphrase that is manually entered to generate the encryption key
key caching
uses a passphrase that is manually entered to generate the encryption key
802.11i
uses a passphrase that is manually entered to generate the encryption key
Message Integrity Check
uses a passphrase that is manually entered to generate the encryption key
dynamic
uses a passphrase that is manually entered to generate the encryption key
AES-CCMP
uses a passphrase that is manually entered to generate the encryption key
pre-shared key authentication
uses a passphrase that is manually entered to generate the encryption key
broadcast
uses a passphrase that is manually entered to generate the encryption key
Advanced Encryption Standard
uses a passphrase that is manually entered to generate the encryption key
supplicant
performs three steps on every block (128 bits) of plaintext
key caching
performs three steps on every block (128 bits) of plaintext
802.11i
performs three steps on every block (128 bits) of plaintext
Message Integrity Check
performs three steps on every block (128 bits) of plaintext
dynamic
performs three steps on every block (128 bits) of plaintext
AES-CCMP
performs three steps on every block (128 bits) of plaintext
pre-shared key authentication
performs three steps on every block (128 bits) of plaintext
broadcast
performs three steps on every block (128 bits) of plaintext
Advanced Encryption Standard
performs three steps on every block (128 bits) of plaintext
supplicant
traffic sent to all users on the network
key caching
traffic sent to all users on the network
802.11i
traffic sent to all users on the network
Message Integrity Check
traffic sent to all users on the network
dynamic
traffic sent to all users on the network
AES-CCMP
traffic sent to all users on the network
pre-shared key authentication
traffic sent to all users on the network
broadcast
traffic sent to all users on the network
Advanced Encryption Standard
traffic sent to all users on the network
supplicant
stores information from a device on the network so if a user roams away from an AP and later returns, she does not need to re-enter all of the credentials
key caching
stores information from a device on the network so if a user roams away from an AP and later returns, she does not need to re-enter all of the credentials
802.11i
stores information from a device on the network so if a user roams away from an AP and later returns, she does not need to re-enter all of the credentials
Message Integrity Check
stores information from a device on the network so if a user roams away from an AP and later returns, she does not need to re-enter all of the credentials
dynamic
stores information from a device on the network so if a user roams away from an AP and later returns, she does not need to re-enter all of the credentials
AES-CCMP
stores information from a device on the network so if a user roams away from an AP and later returns, she does not need to re-enter all of the credentials
pre-shared key authentication
stores information from a device on the network so if a user roams away from an AP and later returns, she does not need to re-enter all of the credentials
broadcast
stores information from a device on the network so if a user roams away from an AP and later returns, she does not need to re-enter all of the credentials
Advanced Encryption Standard
stores information from a device on the network so if a user roams away from an AP and later returns, she does not need to re-enter all of the credentials
supplicant
encryption protocol in the 802.11i standard
key caching
encryption protocol in the 802.11i standard
802.11i
encryption protocol in the 802.11i standard
Message Integrity Check
encryption protocol in the 802.11i standard
dynamic
encryption protocol in the 802.11i standard
AES-CCMP
encryption protocol in the 802.11i standard
pre-shared key authentication
encryption protocol in the 802.11i standard
broadcast
encryption protocol in the 802.11i standard
Advanced Encryption Standard
encryption protocol in the 802.11i standard
supplicant
solves the weak IV problem by rotating the keys frequently
key caching
solves the weak IV problem by rotating the keys frequently
802.11i
solves the weak IV problem by rotating the keys frequently
Message Integrity Check
solves the weak IV problem by rotating the keys frequently
dynamic
solves the weak IV problem by rotating the keys frequently
AES-CCMP
solves the weak IV problem by rotating the keys frequently
pre-shared key authentication
solves the weak IV problem by rotating the keys frequently
broadcast
solves the weak IV problem by rotating the keys frequently
Advanced Encryption Standard
solves the weak IV problem by rotating the keys frequently
supplicant
robust security network
key caching
robust security network
802.11i
robust security network
Message Integrity Check
robust security network
dynamic
robust security network
AES-CCMP
robust security network
pre-shared key authentication
robust security network
broadcast
robust security network
Advanced Encryption Standard
robust security network
supplicant
designed to prevent an attacker from capturing, altering, and resending data packets
key caching
designed to prevent an attacker from capturing, altering, and resending data packets
802.11i
designed to prevent an attacker from capturing, altering, and resending data packets
Message Integrity Check
designed to prevent an attacker from capturing, altering, and resending data packets
dynamic
designed to prevent an attacker from capturing, altering, and resending data packets
AES-CCMP
designed to prevent an attacker from capturing, altering, and resending data packets
pre-shared key authentication
designed to prevent an attacker from capturing, altering, and resending data packets
broadcast
designed to prevent an attacker from capturing, altering, and resending data packets
Advanced Encryption Standard
designed to prevent an attacker from capturing, altering, and resending data packets
supplicant
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/42
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 9: Implementing Wireless Lan Security
1
WPA authentication can be accomplished by using either IEEE 802.1x or pre-shared key (PSK) technology.
True
2
Within the IEEE 802.1x standard, ____ ensures that a device (wired or wireless) that requests access to the network is prevented from receiving any traffic until its identity can be verified.

A) an access control list
B) port security
C) port scanning
D) port blocking
B
3
The block cipher used in 802.11i is the Data Encryption Standard (DES).
False
4
How long is the per-packet key used in TKIP?

A) 40-bits
B) 64-bits
C) 128-bits
D) 256-bits
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
5
A virtual private network (VPN) uses a public, unsecured network as if it were a private, secured network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
6
____ was designed to address WEP vulnerabilities with a minimum of inconvenience.

A) IEEE 802.11i
B) TGi
C) dynamic WEP
D) WPA
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
7
The ____ wireless security standard provides a low level of security.

A) Dynamic WEP
B) WEP
C) WEP2
D) All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
8
What authentication system did the proposed WEP2 standard use?

A) Kerberos
B) AES-CCMP
C) dynamic WEP
D) key caching
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
9
Pre-shared key (PSK) authentication uses a passphrase that is automatically generated to generate the encryption key.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
10
Within Step 2 of Advanced Encryption Standard (AES), multiple iterations (called rounds) are performed depending upon the key size: 128-bit key performs 9 rounds, a 192-bit key performs 11 rounds, and a 256-bit key uses ____ rounds.

A) 13
B) 15
C) 17
D) 19
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
11
What security technology was most recently introduced?

A) WPA
B) WPA2
C) WEP2
D) Dynamic WEP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
12
____ replaces CRC in WPA.

A) MIC
B) MRC
C) CMR
D) CMC
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
13
What feature of IEEE 802.11i allows a device to become authenticated to an AP before moving to it?

A) key caching
B) port security
C) pre-authentication
D) message passing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
14
The personal security model is intended for settings in which a(n) ____ is unavailable.

A) wired network
B) authentication server
C) AP
D) intermediate security model
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
15
The 802.11i standard addresses both ____.

A) encryption and confidentiality
B) integrity and confidentiality
C) authentication and direction
D) encryption and authentication
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
16
In dynamic WEP, the ____ key is changed every time the user roams to a new AP or logs out and logs back in.

A) broadcast
B) unicast
C) passphrase
D) ticket
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
17
WEP2 attempted to overcome the limitations of WEP by adding two new security enhancements.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
18
The ____ method of encryption is used in a personal security model.

A) PSK
B) WEP
C) TKIP
D) MAC
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
19
When implementing an interim security model, most vendors have the option of a 128-bit WEP key, which can be created by entering 16 ____ characters. This provides the most secure option.

A) ASCII
B) ciphered
C) hexadecimal
D) plaintext
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
20
What is the first step in implementing an interim security model?

A) shared key authentication
B) port security
C) turning off SSID beaconing
D) MAC address filtering
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
21
Describe Advanced Encryption Standard (AES).
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
22
Describe pre-shared key authentication.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
23
____ is considered to be the "heart and soul" of WPA security.

A) PSK
B) IV
C) MIC
D) TKIP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
24
At the heart of a WIDS are ____; these devices, which can be either separate hardware devices or a standard access point operating in a special "scan" mode, monitor the airwaves to detect signals from rogue access points.

A) captive portals
B) VPNs
C) firewalls
D) wireless sensors
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
25
The ____________________ security model is designed for medium to large-size organizations such as businesses, government agencies, and universities.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
26
What should a business do if the best possible security model cannot be implemented?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
27
Temporal Key Integrity Protocol (TKIP) has three major components to address vulnerabilities. List and describe them.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
28
A ____ VPN is a user-to-LAN connection used by remote users.

A) remote-access
B) site-to-site
C) peer-to-peer
D) remote-to-LAN
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
29
Most consumer access points are in reality wireless ____________________, because they combine the functions of an access point, router, network address translator, firewall, and switch.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
30
Describe the Temporal Key Integrity Protocol used by Wi-Fi Protected Access (WPA).
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
31
____ authentication is used in the enterprise security model using WPA and WPA2.

A) AES
B) TKIP
C) IEEE 802.1x
D) All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
32
Describe Kerberos.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
33
Encryption under the WPA2 personal security model is accomplished by using the block cipher ____.

A) TKIP
B) AES
C) PSK
D) CBC
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
34
The ____________________ security model is designed for single users or small office home office (SOHO) settings of generally 10 or fewer wireless devices.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
35
____________________ was developed by the Massachusetts Institute of Technology (MIT) and used to verify the identity of network users.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
36
In WPA, ________________________________________ encryption replaces WEP's small 40-bit encryption key that must be manually entered on wireless APs and devices and does not change.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
37
A network supporting the 802.1x standard consists of three elements. Identify and describe each one.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
38
What is the name of the 128-bit key used in TKIP?

A) temporal key
B) MIC
C) XOR
D) PRNG
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
39
Describe the 802.1x authentication procedure.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
40
What is a wireless gateway?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
41
What are the ways in which captive portals are used?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
42
Match between columns
wireless device that requires secure network access
key caching
wireless device that requires secure network access
802.11i
wireless device that requires secure network access
Message Integrity Check
wireless device that requires secure network access
dynamic
wireless device that requires secure network access
AES-CCMP
wireless device that requires secure network access
pre-shared key authentication
wireless device that requires secure network access
broadcast
wireless device that requires secure network access
Advanced Encryption Standard
wireless device that requires secure network access
supplicant
uses a passphrase that is manually entered to generate the encryption key
key caching
uses a passphrase that is manually entered to generate the encryption key
802.11i
uses a passphrase that is manually entered to generate the encryption key
Message Integrity Check
uses a passphrase that is manually entered to generate the encryption key
dynamic
uses a passphrase that is manually entered to generate the encryption key
AES-CCMP
uses a passphrase that is manually entered to generate the encryption key
pre-shared key authentication
uses a passphrase that is manually entered to generate the encryption key
broadcast
uses a passphrase that is manually entered to generate the encryption key
Advanced Encryption Standard
uses a passphrase that is manually entered to generate the encryption key
supplicant
performs three steps on every block (128 bits) of plaintext
key caching
performs three steps on every block (128 bits) of plaintext
802.11i
performs three steps on every block (128 bits) of plaintext
Message Integrity Check
performs three steps on every block (128 bits) of plaintext
dynamic
performs three steps on every block (128 bits) of plaintext
AES-CCMP
performs three steps on every block (128 bits) of plaintext
pre-shared key authentication
performs three steps on every block (128 bits) of plaintext
broadcast
performs three steps on every block (128 bits) of plaintext
Advanced Encryption Standard
performs three steps on every block (128 bits) of plaintext
supplicant
traffic sent to all users on the network
key caching
traffic sent to all users on the network
802.11i
traffic sent to all users on the network
Message Integrity Check
traffic sent to all users on the network
dynamic
traffic sent to all users on the network
AES-CCMP
traffic sent to all users on the network
pre-shared key authentication
traffic sent to all users on the network
broadcast
traffic sent to all users on the network
Advanced Encryption Standard
traffic sent to all users on the network
supplicant
stores information from a device on the network so if a user roams away from an AP and later returns, she does not need to re-enter all of the credentials
key caching
stores information from a device on the network so if a user roams away from an AP and later returns, she does not need to re-enter all of the credentials
802.11i
stores information from a device on the network so if a user roams away from an AP and later returns, she does not need to re-enter all of the credentials
Message Integrity Check
stores information from a device on the network so if a user roams away from an AP and later returns, she does not need to re-enter all of the credentials
dynamic
stores information from a device on the network so if a user roams away from an AP and later returns, she does not need to re-enter all of the credentials
AES-CCMP
stores information from a device on the network so if a user roams away from an AP and later returns, she does not need to re-enter all of the credentials
pre-shared key authentication
stores information from a device on the network so if a user roams away from an AP and later returns, she does not need to re-enter all of the credentials
broadcast
stores information from a device on the network so if a user roams away from an AP and later returns, she does not need to re-enter all of the credentials
Advanced Encryption Standard
stores information from a device on the network so if a user roams away from an AP and later returns, she does not need to re-enter all of the credentials
supplicant
encryption protocol in the 802.11i standard
key caching
encryption protocol in the 802.11i standard
802.11i
encryption protocol in the 802.11i standard
Message Integrity Check
encryption protocol in the 802.11i standard
dynamic
encryption protocol in the 802.11i standard
AES-CCMP
encryption protocol in the 802.11i standard
pre-shared key authentication
encryption protocol in the 802.11i standard
broadcast
encryption protocol in the 802.11i standard
Advanced Encryption Standard
encryption protocol in the 802.11i standard
supplicant
solves the weak IV problem by rotating the keys frequently
key caching
solves the weak IV problem by rotating the keys frequently
802.11i
solves the weak IV problem by rotating the keys frequently
Message Integrity Check
solves the weak IV problem by rotating the keys frequently
dynamic
solves the weak IV problem by rotating the keys frequently
AES-CCMP
solves the weak IV problem by rotating the keys frequently
pre-shared key authentication
solves the weak IV problem by rotating the keys frequently
broadcast
solves the weak IV problem by rotating the keys frequently
Advanced Encryption Standard
solves the weak IV problem by rotating the keys frequently
supplicant
robust security network
key caching
robust security network
802.11i
robust security network
Message Integrity Check
robust security network
dynamic
robust security network
AES-CCMP
robust security network
pre-shared key authentication
robust security network
broadcast
robust security network
Advanced Encryption Standard
robust security network
supplicant
designed to prevent an attacker from capturing, altering, and resending data packets
key caching
designed to prevent an attacker from capturing, altering, and resending data packets
802.11i
designed to prevent an attacker from capturing, altering, and resending data packets
Message Integrity Check
designed to prevent an attacker from capturing, altering, and resending data packets
dynamic
designed to prevent an attacker from capturing, altering, and resending data packets
AES-CCMP
designed to prevent an attacker from capturing, altering, and resending data packets
pre-shared key authentication
designed to prevent an attacker from capturing, altering, and resending data packets
broadcast
designed to prevent an attacker from capturing, altering, and resending data packets
Advanced Encryption Standard
designed to prevent an attacker from capturing, altering, and resending data packets
supplicant
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.