Which encryption algorithm should you implement?

You are trying to select a particular wireless encryption algorithm. You are concerned that it
implements as much of the wireless 802.11i standard as possible. Which encryption algorithm
should you implement?

You are trying to select a particular wireless encryption algorithm. You are concerned that it
implements as much of the wireless 802.11i standard as possible. Which encryption algorithm
should you implement?

A.
WEP2

B.
WPA2

C.
WPA

D.
WEP

Explanation:
WPA2 is, to date, the most 802.11i compliant encryption protocol available.
Answer option C is incorrect. WPA2 is an improvement over WPA, but unlike WPA2 it does not
implement certain key elements of 802.11i such as Counter Mode with Cipher Block Chaining
Message Authentication Code.
Answer option D is incorrect. WEP does not implement many aspects of the 802.11i standards.
What is WEP?
Wired Equivalent Privacy (WEP) is a security protocol for wireless local area networks (WLANs). It
has two components, authentication and encryption. It provides security, which is equivalent to
wired networks, for wireless networks. WEP encrypts data on a wireless network by using a fixed
secret key. WEP incorporates a checksum in each frame to provide protection against the attacks
that attempt to reveal the key stream.
Answer option A is incorrect. WEP2 does not actually exist. It is not an encryption algorithm.
Reference:
http://en.wikipedia.org/wiki/Wi-Fi_Protected_Access



Leave a Reply 0

Your email address will not be published. Required fields are marked *