CompTIA Exam Questions

Which of the following technologies can be used to encrypt the wireless networks?

Which of the following technologies can be used to encrypt the wireless networks?
Each correct answer represents a complete solution. Choose two.

A.
WAP

B.
Kerberos

C.
WEP

D.
WPA

Explanation:

WPA and WEP can be used to encrypt wireless networks.
WPA stands for Wi-Fi Protected Access. It is a wireless security standard. It provides better security
than WEP (Wired Equivalent Protection). Windows Vista supports both WPA-PSK and WPA-EAP. Each
of these is described as follows:
WPA-PSK: PSK stands for Preshared key. This standard is meant for home environment. WPA-PSK
requires a user to enter an 8-character to 63-character passphrase into a wireless client. The WPA
converts the passphrase into a 256-bit key. WPA-EAP: EAP stands for Extensible Authentication
Protocol. This standard relies on a back-end server that runs Remote Authentication Dial-In User
Service for user authentication.
Note: Windows Vista supports a user to use a smart card to connect to a WPA-EAP protected
network.
Wired Equivalent Privacy (WEP) is a security protocol for wireless local area networks (WLANs). It
has two components, authentication and encryption. It provides security, which is equivalent to
wired networks, for wireless networks. WEP encrypts data on a wireless network by using a fixed
secret key. WEP incorporates a checksum in each frame to provide protection against the attacks
that attempt to reveal the key stream.
Answer option B is incorrect. Kerberos is a computer network authentication protocol that allows
individuals communicating over a non-secure network to prove their identity to one another in a
secure manner.
Answer option A is incorrect. The Wireless Access Protocol (WAP) is a technology used with wireless
devices. The functionality of WAP is equivalent to that of TCP/IP. WAP uses a smaller version of
HTML called Wireless Markup Language (WML) to display Internet sites.
Reference: “http://en.wikipedia.org/wiki/Wi-Fi_Protected_Access”,
“http://en.wikipedia.org/wiki/Wired_Equivalent_Privacy”