What are the two types of device authentication supported by the IEEE 802.11 standard?
What will be an ideal response?
There are two types of device authentication supported by the IEEE 802.11 standard. Open system authentication, the default method, uses the Service Set Identifier (SSID) to authenticate a device. After receiving an association request frame from a wireless device that wants to join the WLAN, the access point compares the SSID received with the actual SSID of the network. If the two match then the wireless device is authenticated. An optional authentication method is shared key authentication, in which the Wired Equivalent Privacy (WEP) default key is used. A wireless device sends a frame to the AP and the AP sends back a frame that contains a block of text known as the challenge text. The wireless device must encrypt the text with the default key and return it to the AP. the AP will then decrypt what was returned to see if it matches the original challenge text. If it does, the device is authenticated and allowed to become part of the network.
You might also like to view...
What step can the network technician verify connectivity with an access point?
a. verify the SSID b. Ping the ip address for the access point c. Ping the access point’s mac address d. call the network administrator
What is object-oriented programming?
What will be an ideal response?
Write an SQL query that returns the street of all addresses in 'Stony Brook NY' that are destination of a trip on '5/14/02'.
Suppose a database has the following schema: Trip(fromAddrId: INTEGER, toAddrId: INTEGER, date: DATE) Address(id: INTEGER, street: STRING, townState: STRING)
to protect users from each other,3. to protect users from themselves,4. to protect it from itself, and5. to protect itself from its environment. PTS: 1 2. What are the three security objectives of audit trails? Explain.
What will be an ideal response?