Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

1. _____ is a hotspot that displays a web page which requires users to log on or agree to certain terms. A.

1.  _____ is a hotspot that displays a web page which requires users to log on or agree to certain terms.
    A.     captive portal
    B.     RADIUS
    C.     IEEE 802.1x server
    D.     WPA3

2.  A wireless network uses a RADIUS server that is connected to an authenticator, which in turn connects to a supplicant. What kind of authentication structure is being used?
    A.     Captive portal
    B.     RADIUS federation
    C.     IEEE 802.1X
    D.     EAP

3.  What does WPA3 use for the encryption algorithm?
    A.     ECC
    B.     DES
    C.     AES
    D.     RSA

4.  Depending on the Channels selected, a/an _____ can be used to make the network more resilient or create more interference.
    A.     Heat map
    B.     WiFi analyzer
    C.     Stand-alone access point (AP)
    D.     Channel overlay

5.  IEEE 802.1X supports what framework that is used for transporting authentication protocols?
    A.     WPA2
    B.     WPS
    C.     EAP
    D.     AES

6.  With a/an _____, two or more companies use the same identity management system, so users can log on to one organization's network and automatically log onto another organization’s network.
    A.     WPA2
    B.     RADIUS federation
    C.     WPS
    D.     EAP

7.  What is an example of a RADIUS Federation for higher education institutions?
    A.     IEEE 802.1X
    B.     EAP
    C.     eduroam
    D.     SSO

8.  _____ is a network device that is managed by a wireless LAN controller (WLC), which centralizes any configuration changes.
    A.     Controller-based access point (AP)
    B.     Stand-alone access point (AP)
    C.     Omnidirectional (omni) antenna
    D.     Directional antenna

9.  A/an _____ is when we examine the current wireless environment to find potential issues.
    A.     Channel overlay
    B.     Omnidirectional (omni) antenna
    C.     Stand-alone access point (AP)
    D.     Site survey

10.  Which of the following WPA/WPA2/WPA3 modes is the MOST secure?
    A.     Enterprise mode
    B.     WPS
    C.     Personal mode
    D.     Open mode

Step by Step Solution

There are 3 Steps involved in it

Step: 1

The detailed answer for the above question is provided below 1 A Captive portal 2 C IEEE 8021X 3 C A... blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Managing Risk In Information Systems

Authors: Darril Gibson, Andy Igonor

3rd Edition

1284193608, 978-1284193602

More Books

Students also viewed these Programming questions

Question

What is the difference between narcolepsy and sleep apnea?

Answered: 1 week ago