A network administrator is implementing a wireless honeypot to detect wireless breach attempts. The honeypot
must implement weak encryption to lure malicious users into easily breaking into the network. Which ofthe
following should the network administrator implement on the WAP?

A.
WPA
B.
WPA2
C.
WEP
D.
VPN
WEP(Wired Equivalent Privacy)- wireless security protocol that uses 64-bit encryption algorithm to scramble data packets
WPA(Wireless Protection Access)- wireless security protocol that addresses weaknesses and acts as an upgrade of WEP. Offers security enhancements such as dynamic encryption key generation, encryption key integrity-checking feature, user authentication through EAP(Extension Authentication Protocol
WAP2- upgraded WPA. uses Advanced Encryption Standard algorithm
VPN(Virtual Private Network)- network config that allows remote user to access private network via Internet. employ tunneling. = which protects data from interception.
0
0