» Authentication Authorization & Accounting

EnsurepassHere you will find answers to Authentication Authorization & Accounting Questions Question 1 How do you define the authentication method that will be used with AAA? A. With a method list B. With the method command C. With the method aaa command D. With a method statement   Answer: A Explanation A method list is a sequential list of authentication methods to query to authenticate a user. Method lists enable you to designate one or more security protocols to be used for authentication, Read more […]

» Authentication and Encryption 2

EnsurepassHere you will find answers to Authentication and Encryption – Part 2 // // Question 1 What two statements are true about AES-CCMP? (Choose two) A. It is an encryption algorithm used in the 802.11i security protocol. B. It is defined in 802.1X. C. It is the encryption algorithm used in TKIP implementations. D. It is required in WPA. E. It is required in WPA2.   Answer: A E Explanation Advanced Encryption Standard (AES) is the cipher system used by RSN. It is the equivalent of Read more […]

» Authentication and Encryption

EnsurepassHere you will find answers to Authentication and Encryption Questions Question 1 What are three primary components that describe TKIP? (Choose three) A. Broadcast Key Rotation B. Dynamic WEP C. Message Integrity Check D. Per-Packet Key Hashing E. Symmetric Key Cipher F. WPA2 Enterprise Mode   Answer: A C D Explanation TKIP offers three advantages over WEP: * Per packet keying: Each packet is generated using a unique key so it is much more difficult to get from repetitive data back Read more […]

Proudly powered by WordPress   Premium Style Theme by www.gopiplus.com