Who may authenticate to the company’s access point?

A company uses WEP (Wired Equivalent Privacy) for wireless security. Who may authenticate to the company’s access point?

A company uses WEP (Wired Equivalent Privacy) for wireless security. Who may authenticate to the company’s access point?

A.
Only the administrator.

B.
Anyone can authenticate.

C.
Only users within the company.

D.
Only users with the correct WEP (Wired Equivalent Privacy) key.

Explanation:
The 802.11 standard describes the communication that occurs in wireless local area networks (LANs).The Wired Equivalent Privacy (WEP) algorithm is used to protect wireless communication from eavesdropping. A secondary function of WEP is to prevent unauthorized access to a wireless network; this function is not an explicit goal in the 802.11 standard, but it is frequently considered to be a feature of WEP.
WEP relies on a secret key that is shared between a mobile station (e.g. a laptop with a wireless Ethernet card) and an access point (i.e. a base station). The secret key is used to encrypt packets before they are transmitted, and an integrity check is used to ensure that packets are not modified in transit. The standard does not discuss how the shared key is established. In practice, most installations use a single key that is shared between all mobile stations and access points. More sophisticated key management techniques can be used to help defend from the attacks we describe; however, no commercial system we are aware of has mechanisms to support such techniques.
Reference: http://www.isaac.cs.berkeley.edu/isaac/wep-faq.html



Leave a Reply 1

Your email address will not be published. Required fields are marked *


Ric

Ric

Don’t forget that WEP is the weakest type of wireless encryption.

Yes, reading older stuff does actually help, as you can see the questions from a different perspective.