Who among the following can authenticate from the access point of the network?

You work as a Network Administrator for Infonet Inc. The company uses Wired Equivalent Privacy
(WEP) for wireless security. Who among the following can authenticate from the access point of the
network?

You work as a Network Administrator for Infonet Inc. The company uses Wired Equivalent Privacy
(WEP) for wireless security. Who among the following can authenticate from the access point of the
network?

A.
Only users within the company.

B.
Only users with the correct WEP key.

C.
Anyone can authenticate.

D.
Only the administrator.

Explanation:
Only users with the correct WEP key can authenticate from the access point of the network.
What is WEP?
Wired Equivalent Privacy (WEP) is a security protocol for wireless local area networks (WLANs). It
has two components, authentication and encryption. It provides security, which is equivalent to
wired networks, for wireless networks. WEP encrypts data on a wireless network by using a fixed
secret key. WEP incorporates a checksum in each frame to provide protection against the attacks
that attempt to reveal the key stream.
Reference:
TechNet, Contents: “Wireless LAN Technologies and Windows XP”



Leave a Reply 0

Your email address will not be published. Required fields are marked *