Matching
Match each item with an statement below:
Premises:
allows a company to maintain user profiles in a central database that all remote servers can share.
subset of 802.11i that addresses both encryption and authentication.
allows a device to become authenticated to an AP before moving into range of the AP.
second generation of WPA security.
encryption protocol in the 802.11i standard.
"leases" IP addresses to clients to use while they are connected to the network.
manipulates an entire block of text at one time.
intended for settings in which an authentication server is unavailable.
designed for medium to large-sized organizations such as businesses, government agencies, and universities.
Responses:
Personal security model
Block cipher
Pre-authentication
AES-CCMP
DHCP
RADIUS
WPA
WPA2
Enterprise security model
Correct Answer:
Premises:
Responses:
allows a company to maintain user profiles in a central database that all remote servers can share.
subset of 802.11i that addresses both encryption and authentication.
allows a device to become authenticated to an AP before moving into range of the AP.
second generation of WPA security.
encryption protocol in the 802.11i standard.
"leases" IP addresses to clients to use while they are connected to the network.
manipulates an entire block of text at one time.
intended for settings in which an authentication server is unavailable.
designed for medium to large-sized organizations such as businesses, government agencies, and universities.
Premises:
allows a company to maintain user profiles in a central database that all remote servers can share.
subset of 802.11i that addresses both encryption and authentication.
allows a device to become authenticated to an AP before moving into range of the AP.
second generation of WPA security.
encryption protocol in the 802.11i standard.
"leases" IP addresses to clients to use while they are connected to the network.
manipulates an entire block of text at one time.
intended for settings in which an authentication server is unavailable.
designed for medium to large-sized organizations such as businesses, government agencies, and universities.
Responses:
Related Questions
Q32: PSK requires that a key (also called
Q33: What are the steps involved in the
Q34: WPA replaces WEP with an encryption technology
Q35: WPA authentication can be accomplished by using
Q36: What are the main characteristics of the
Q37: What are some of the PSK key
Q38: What are some of the reasons why
Q39: The most robust level of security that
Q40: What are the TKIP major components?
Q41: How do TKIP and MIC perform encryption
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents