Search Header Logo

A+ 1102 Day 4b ITSA 2.2 Compare wireless sec protocols and Auth

Authored by Patrick Hines

Computers

Professional Development

Used 2+ times

A+ 1102 Day 4b ITSA 2.2 Compare wireless sec protocols and Auth
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

29 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which wireless security protocol uses a pre-shared key (PSK) for authentication and encryption?

WEP
WPA
WPA2
WPA3

Answer explanation

WPA2 (Wi-Fi Protected Access 2) uses a pre-shared key (PSK) for authentication and encryption. It provides stronger security compared to WEP (Wired Equivalent Privacy) and is widely used in wireless networks.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

True or False: WPA3 uses the same encryption algorithm as WPA2.

True
False

Answer explanation

False. WPA3 (Wi-Fi Protected Access 3) introduces a new encryption algorithm called Simultaneous Authentication of Equals (SAE), also known as Dragonfly, which provides stronger security compared to the older encryption algorithm used in WPA2.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which authentication method requires users to enter a username and password to access a wireless network?

MAC Filtering
WPS
WPA Enterprise
Captive Portal

Answer explanation

WPA Enterprise authentication requires users to enter a username and password (credentials) to access a wireless network. It utilizes an authentication server, such as RADIUS (Remote Authentication Dial-In User Service), for centralized authentication and offers stronger security than pre-shared keys.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What wireless security protocol encrypts data using Advanced Encryption Standard (AES) encryption?

WEP
WPA
WPA2
WPA3

Answer explanation

WPA2 (Wi-Fi Protected Access 2) encrypts data using Advanced Encryption Standard (AES) encryption, providing stronger security compared to the older encryption algorithms used in WEP (Wired Equivalent Privacy) and WPA (Wi-Fi Protected Access).

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

True or False: WPA3 supports simultaneous authentication of multiple devices.

True
False

Answer explanation

True. WPA3 (Wi-Fi Protected Access 3) supports simultaneous authentication of multiple devices using the Simultaneous Authentication of Equals (SAE) protocol, also known as Dragonfly. This allows multiple devices to authenticate concurrently, improving efficiency and security.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which wireless security protocol uses a four-way handshake for key exchange during the authentication process?

WEP
WPA
WPA2
WPA3

Answer explanation

WPA2 (Wi-Fi Protected Access 2) uses a four-way handshake for key exchange during the authentication process. This handshake helps establish a secure connection between the client device and the access point, ensuring confidentiality and integrity of data transmission.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What authentication method involves pressing a button on the router and device to establish a secure connection?

MAC Filtering
WPS
WPA Enterprise
Captive Portal

Answer explanation

Wi-Fi Protected Setup (WPS) involves pressing a button on the router and device to establish a secure connection without the need to enter a password manually. While convenient, WPS has security vulnerabilities and is often disabled for better security.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?