You work as a Network Administrator for NetTech Inc. The company has a wireless local area
network (WLAN). You want to prevent your wireless access point from being accessed by intruders.
What will you do to accomplish the task?
A.
Implement WEP.
B.
Implement EAP.
C.
Implement SSL.
D.
Implement auditing.
Explanation:
In order to prevent your wireless access point from being accessed by intruders, you will have to
implement Wired Equivalent Privacy (WEP) on the network. WEP is a security protocol for wireless
local area networks (WLANs). It is the most commonly and widely accepted security standard.
Almost all the available operating systems, wireless access points, wireless bridges support this
security standard. It has two components, authentication and encryption. It provides security, which
is equivalent to wired networks, for wireless networks. WEP encrypts data on a wireless network by
using a fixed secret key. WEP incorporates a checksum in each frame to provide protection against
the attacks that attempt to reveal the key stream.
Answer option C is incorrect. Secure Sockets Layer (SSL) is a protocol used to transmit private
documents via the Internet. SSL uses a combination of public key and symmetric encryption to
provide communication privacy, authentication, and message integrity. Using the SSL protocol,
clients and servers can communicate in a way that prevents eavesdropping and tampering of data
on the Internet. Many Web sites use the SSL protocol to obtain confidential user information, such
as credit card numbers. By convention, URLs that require an SSL connection start with https: instead
of http:. By default, SSL uses port 443 for secured communication.
Answer option D is incorrect. Auditing is used to track user accounts for file and object access, logon
attempts, system shutdown etc. This enhances the security of the network. Before enabling auditing,
the type of event to be audited should be specified in the Audit Policy in User Manager for Domains.
Answer option B is incorrect. Extensible Authentication Protocol (EAP) is an authentication protocol
that provides support for a wide range of authentication methods, such as smart cards, certificates,
one-time passwords, public keys, etc. It is an extension to Point-to-Point Protocol (PPP), which
allows the application of arbitrary authentication mechanisms for the validation of a PPP connection.
Reference: “http://en.wikipedia.org/wiki/Wired_Equivalent_Privacy”