Advertisement Upgrade to remove ads

On a wireless network that is employing WEP, which type of users are allowed to authenticate through the access points?

Users with the correct WEP key.

You need to add security for your wireless network. You would like to use the most secure method.
Which method should you implement?

WPA2

Which of the following wireless security methods uses common shared key configured on the wireless access point and all wireless clients?

WEP, WPA Personal, and WPA2 Personal

On wireless networks, which technology is employed to provide the same type of protection that cables provide on a wired network?

WEP

You want to implement 802.1x authentication on your wireless network. Which of the following will be required?

RADIUS

Which of the following specifications identify security that can be added to wireless networks?

802.11i
802.11x

What encryption method is used by WPA for wireless networks?

TKIP

Which of the following protocols or mechanisms is not used to provide security on a wireless network?

RDP

You want to implement 802.1x authentication on your wireless network. Where would you configure passwords that are used for authentication?

On a RADIUS server

Please allow access to your computer’s microphone to use Voice Recording.

Having trouble? Click here for help.

We can’t access your microphone!

Click the icon above to update your browser permissions above and try again

Example:

Reload the page to try again!

Reload

Press Cmd-0 to reset your zoom

Press Ctrl-0 to reset your zoom

It looks like your browser might be zoomed in or out. Your browser needs to be zoomed to a normal size to record audio.

Please upgrade Flash or install Chrome
to use Voice Recording.

For more help, see our troubleshooting page.

Your microphone is muted

For help fixing this issue, see this FAQ.

Star this term

You can study starred terms together

NEW! Voice Recording

Create Set