a. For what use scenario was 802.11i PSK initial authentication mode created? b. What must a user
Question:
a. For what use scenario was 802.11i PSK initial authentication mode created?
b. What must a user know to authenticate his or her device to the access point?
4b.) In 802.11i _________, hosts must know a shared initial key.
a. 802.1X initial authentication mode
b. PSK initial authentication mode
c. Both A and B
d. Neither A nor B
c. In what ways is the pairwise session key the user receives after authentication different from the PSK?
4c1.) After authentication in 80.11i PSK mode, a wireless client communicates with the access point via a(n) _________ key.
a. VPN
b. Pairwise session
c. 802.1X
d. Preshared
4c2.) After two wireless clients authenticate themselves via PSK to an access point, they will use _________ to communicate with the access point.
a. The preshared key
b. An 802.1X key
c. WPA keys
d. Different pairwise session keys
d. What three operational security threats must PSK users consider?
4d.) Which of the following is a risk in 802.11i PSK mode?
a. Unauthorized sharing of the pre-shared key
b. A weak passphrase may be selected
c. Both A and B
d. Neither A nor B
e. Why is this risk probably acceptable for the PSK use scenario?
f. How long must passphrases be to generate strong pre-shared keys?
4f.) In 802.11i PSK mode, the pass phrase should be at least _________ characters long.
a. 8
b. 12
c. 20
d. 128
Step by Step Answer:
Business Data Networks and Security
ISBN: 978-0134817125
11th Edition
Authors: Raymond R. Panko, Julia L. Panko