What is WEP?
Wired Equivalent Privacy
What is WPA?
Wi-Fi Protected Access
What order were the encryption standards created?
WEP -> WPA -> WPA2
Which wireless security protocol has been discouraged in favor of newer standards due to known vulnerabilities resulting from implementation flaws?
WEP
What is the best method to secure a small network lacking an authentication server?
WPA2-PSK
What are the characteristic features of a WPA/WPA2 Enterprise mode? [2]
- Suitable for large corporate networks
A security protocol designed to strengthen WEP implementations is known as:
TKIP
AES-based encryption mode is a characteristic feature of:
WPA2
Which cryptographic algorithm is the least vulnerable to attacks?
AES
What is one of the functions provided by RADIUS and TACACS servers?
Authentication
What are the characteristic features of RADIUS? [3]
What are the characteristics of TACACS+? [3]