How can we help?

You can also find more resources in our Help Center.

Wireless

STUDY
PLAY
On a wireless network that is employing WEP, which type of users are allowed to authenticate through the access points?
Users with the correct WEP key.
You need to add security for your wireless network. You would like to use the most secure method.
Which method should you implement?
WPA2
Which of the following wireless security methods uses common shared key configured on the wireless access point and all wireless clients?
WEP, WPA Personal, and WPA2 Personal
On wireless networks, which technology is employed to provide the same type of protection that cables provide on a wired network?
WEP
You want to implement 802.1x authentication on your wireless network. Which of the following will be required?
RADIUS
Which of the following specifications identify security that can be added to wireless networks?
802.11i
802.11x
What encryption method is used by WPA for wireless networks?
TKIP
Which of the following protocols or mechanisms is not used to provide security on a wireless network?
RDP
You want to implement 802.1x authentication on your wireless network. Where would you configure passwords that are used for authentication?
On a RADIUS server