Choose the entity or entities that can authenticate to an access point.

The Certpaper .com wireless network environment uses WEP (Wired Equivalent Privacy) to
provide wireless security.
Choose the entity or entities that can authenticate to an access point.

The Certpaper .com wireless network environment uses WEP (Wired Equivalent Privacy) to
provide wireless security.
Choose the entity or entities that can authenticate to an access point.

A.
Administrators only.

B.
OnlyCertpaper .com users.

C.
AllCertpaper .com users that have the correct WEP (Wired Equivalent Privacy) key.

D.
Anyone

Explanation:

The 802.11 standard describes the communication that occurs in wireless local area networks
(LANs). The Wired Equivalent Privacy (WEP) algorithm is used to protect wireless communication
from eavesdropping. A secondary function of WEP is to prevent unauthorized access to a wireless
network; this function is not an explicit goal in the 802.11 standard, but it is frequently considered
to be a feature of WEP.
WEP relies on a secret key that is shared between a mobile station ( eg . a laptop with a wireless
Ethernet card) and an access point ( ie . a base station). The secret key is used to encrypt packets
before they are transmitted, and an integrity check is used to ensure that packets are not modified
in transit. The standard does not discuss how the shared key is established. In practice, most
installations use a single key that is shared between all mobile stations and access points. More
sophisticated key management techniques can be used to help defend from the attacks we
describe; however, no commercial system we are aware of has mechanisms to support such
techniques.
Reference:
http://www.isaac.cs.berkeley.edu/isaac/wep-faq.html



Leave a Reply 0

Your email address will not be published. Required fields are marked *