Question: Question20 5 points Save Answer From the following statements, select all that correctly describe Wireless Local Area network (WLAN) security a Wired Equivalent Privacy (WEP)
Question20 5 points Save Answer From the following statements, select all that correctly describe Wireless Local Area network (WLAN) security a Wired Equivalent Privacy (WEP) has a number of weaknesses that allow a determined hacker to break into a WLAN that uses only WEP security. Ob. The practice of walking or driving around and using hardware and software tools to discover WLAN signals is often referred to as wardriving. Oc. The only difference between Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA) is that the WPA key is longer than the WEP key Od. Wi-Fi Protected Access 2 (WPA2) uses the Advanced Eneryption Standard (AES) Oe MAC Address Filtering offers the greatest security for a WLAN Question 19 5 points Save Answer From the following statements, select all that correctly describe the various Wireless Local Area Network (WLAN) protocols that are based on the IEEE 802.11 standards, commonly known as Wi-Fi O There are four versions of the 802.11ac protocol. OAll Wi-Fi WLAN protocols are backward compatible. O The 802.1In WLAN protocol has a greater maximum range than does the 802.11g WLAN protocol. O The 802.1In protocol provides three channels of 450 Mbps cach that are designated as channels 1, 2 and 3. O The development of new devices that adhere to the 802.11a protocol is discontinued
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
