Question: a. For what use scenario was 802.11i PSK initial authentication mode created? b. What must a user know to authenticate his or her device to
a. For what use scenario was 802.11i PSK initial authentication mode created?
b. What must a user know to authenticate his or her device to the access point?
4b.) In 802.11i _________, hosts must know a shared initial key.
a. 802.1X initial authentication mode
b. PSK initial authentication mode
c. Both A and B
d. Neither A nor B
c. In what ways is the pairwise session key the user receives after authentication different from the PSK?
4c1.) After authentication in 80.11i PSK mode, a wireless client communicates with the access point via a(n) _________ key.
a. VPN
b. Pairwise session
c. 802.1X
d. Preshared
4c2.) After two wireless clients authenticate themselves via PSK to an access point, they will use _________ to communicate with the access point.
a. The preshared key
b. An 802.1X key
c. WPA keys
d. Different pairwise session keys
d. What three operational security threats must PSK users consider?
4d.) Which of the following is a risk in 802.11i PSK mode?
a. Unauthorized sharing of the pre-shared key
b. A weak passphrase may be selected
c. Both A and B
d. Neither A nor B
e. Why is this risk probably acceptable for the PSK use scenario?
f. How long must passphrases be to generate strong pre-shared keys?
4f.) In 802.11i PSK mode, the pass phrase should be at least _________ characters long.
a. 8
b. 12
c. 20
d. 128
Step by Step Solution
3.34 Rating (166 Votes )
There are 3 Steps involved in it
a Residential use Also for small businesses with a single acc... View full answer
Get step-by-step solutions from verified subject matter experts
