What are some of the PSK key management weaknesses?
What will be an ideal response?
PSK key management weaknesses include the following:
* Like WEP, the distribution and sharing of PSK keys is performed manually without any technology security protections. The keys can be distributed by telephone, e-mail, or a text message (none of which are secure). Any user who obtains the key is assumed to be authentic and approved.
* Unlike WEP, in which four keys can be used, PSK only uses a single key. Should this one PSK key be compromised by an unauthorized attacker the entire WLAN would become vulnerable.
* Standard security practices call for keys to be changed on a regular basis. Changing the PSK key requires reconfiguring the key on every wireless device and on all access points.
* To allow a guest user to have access to a PSK WLAN, the key must be given to that guest. Once the guest departs, this shared secret must be changed on all devices to ensure adequate security for the PSK WLAN.
You might also like to view...
Given that Jamie worked 50 hours (Hours = 50) last week and earns $10.00 an hour (Rate = 10), how much did Jamie earn last week, before taxes (TotalPay)?
```If (Rate >=10) OR (Hours <=40) Then TotalPay = Hours * Rate Else TotalPay = (Hours * Rate)+(Hours–40)*Rate*1.5 End If ``` a. $ 500 b. $ 650 c. $ 750 d. $ 400
What is needed for the effective management of a long-term security situation?
What will be an ideal response?
You cannot delete files and folders from the Files panel.
Answer the following statement true (T) or false (F)
To create a list of sources cited in your document, insert which of the following?
A) bibliography B) works cited C) appendix