SlideShare a Scribd company logo
1 of 2
Download to read offline
1: EAP and 802.1X are usually associated with a
RADIUS server
2:To set up an extra access point to detect intruders is called using a _______.
fly paper
3:Disabling an SSID broadcast is a common option in some wireless 802.11 NICs.802.11 b
Access Point
Solution
solution to question 1-
EAP and 802.1X are usually associated with a WEP
Wired Equivalent Privacy (WEP), which is part of the original 802.11 standard, should provide
confidentiality. Unfortunately WEP is poorly designed and easily cracked. There is no
authentication mechanism, only a weak form of access control.
As a response to WEP broken security, IEEE has come up with a new wireless security standard
named 802.11i. 802.1X plays a major role in this new standard.
The new security standard, 802.11i, which was ratified in June 2004, fixes all WEP weaknesses.
It is divided into three main categories:
The industry didn't have time to wait until the 802.11i standard was completed. They wanted the
WEP issues fixed now! Wi-Fi Alliance felt the pressure, took a "snapshot" of the standard , and
called it Wi-Fi Protected Access (WPA). One requirement was that existing 802.11 equipment
could be used with WPA, so WPA is basically TKIP + 802.1X.
Extensible Authentication Protocol (EAP) is just the transport protocol optimized for
authentication, not the authentication method itself
SOLUTION TO QUESTION2-To set up an extra access point to detect intruders is called using
a HONEYPOT
A honeypot is a computer system that is set up to act as a decoy to lure cyberattackers, and to
detect, deflect or study attempts to gain unauthorized access to information systems.
SOLUTION TO QUESTION 3-
One of the most common security recommendations regarding wireless networks is that you
should disable SSID broadcasting
Temporary Key Integrity Protocol (TKIP) is a short-term solution that fixes all WEP
weaknesses. TKIP can be used with old 802.11 equipment (after a driver/firmware upgrade) and
provides integrity and confidentiality.
Counter Mode with CBC-MAC Protocol (CCMP) is a new protocol, designed from ground up. It
uses AES as its cryptographic algorithm, and, since this is more CPU intensive than RC4 (used
in WEP and TKIP), new 802.11 hardware may be required. Some drivers can implement CCMP
in software. CCMP provides integrity and confidentiality.
802.1X Port-Based Network Access Control: Either when using TKIP or CCMP, 802.1X is used
for authentication.

More Related Content

Similar to 1 EAP and 802.1X are usually associated with aRADIUS server2To.pdf

Viable means using which Wireless Network Security can be Jeopardized
Viable means using which Wireless Network Security can be JeopardizedViable means using which Wireless Network Security can be Jeopardized
Viable means using which Wireless Network Security can be JeopardizedIRJET Journal
 
Describe the primary differences between WEP, WPA, and WPA2 protocol.pdf
Describe the primary differences between WEP, WPA, and WPA2 protocol.pdfDescribe the primary differences between WEP, WPA, and WPA2 protocol.pdf
Describe the primary differences between WEP, WPA, and WPA2 protocol.pdfrajkumarm401
 
Wireless security
Wireless securityWireless security
Wireless securityparipec
 
Wireless security837
Wireless security837Wireless security837
Wireless security837mark scott
 
Wireless LAN Deployment Best Practices
Wireless LAN Deployment Best PracticesWireless LAN Deployment Best Practices
Wireless LAN Deployment Best PracticesMichael Boman
 
Wi fi protected access
Wi fi protected accessWi fi protected access
Wi fi protected accessLopamudra Das
 
Living in the Jungle: Legitimate users in Legitimate Insecure Wireless Networks
Living in the Jungle: Legitimate users in Legitimate Insecure Wireless NetworksLiving in the Jungle: Legitimate users in Legitimate Insecure Wireless Networks
Living in the Jungle: Legitimate users in Legitimate Insecure Wireless NetworksChema Alonso
 
Ch11 Hacking Wireless Networks it-slideshares.blogspot.com
Ch11 Hacking Wireless Networks it-slideshares.blogspot.comCh11 Hacking Wireless Networks it-slideshares.blogspot.com
Ch11 Hacking Wireless Networks it-slideshares.blogspot.comphanleson
 
wireless lan security.ppt
wireless lan security.pptwireless lan security.ppt
wireless lan security.pptSagarBedarkar3
 
Wi fi protected-access
Wi fi protected-accessWi fi protected-access
Wi fi protected-accessbhanu4ugood1
 
Attack Robustness and Security Enhancement with Improved Wired Equivalent Pro...
Attack Robustness and Security Enhancement with Improved Wired Equivalent Pro...Attack Robustness and Security Enhancement with Improved Wired Equivalent Pro...
Attack Robustness and Security Enhancement with Improved Wired Equivalent Pro...IDES Editor
 

Similar to 1 EAP and 802.1X are usually associated with aRADIUS server2To.pdf (20)

Pdf3
Pdf3Pdf3
Pdf3
 
Viable means using which Wireless Network Security can be Jeopardized
Viable means using which Wireless Network Security can be JeopardizedViable means using which Wireless Network Security can be Jeopardized
Viable means using which Wireless Network Security can be Jeopardized
 
Wifi Security
Wifi SecurityWifi Security
Wifi Security
 
Ch06 Wireless Network Security
Ch06 Wireless Network SecurityCh06 Wireless Network Security
Ch06 Wireless Network Security
 
Describe the primary differences between WEP, WPA, and WPA2 protocol.pdf
Describe the primary differences between WEP, WPA, and WPA2 protocol.pdfDescribe the primary differences between WEP, WPA, and WPA2 protocol.pdf
Describe the primary differences between WEP, WPA, and WPA2 protocol.pdf
 
Y36146148
Y36146148Y36146148
Y36146148
 
Network security
Network securityNetwork security
Network security
 
Wireless security
Wireless securityWireless security
Wireless security
 
Wireless security837
Wireless security837Wireless security837
Wireless security837
 
Wireless LAN Deployment Best Practices
Wireless LAN Deployment Best PracticesWireless LAN Deployment Best Practices
Wireless LAN Deployment Best Practices
 
Shashank wireless lans security
Shashank wireless lans securityShashank wireless lans security
Shashank wireless lans security
 
Wi Fi Technology
Wi Fi TechnologyWi Fi Technology
Wi Fi Technology
 
Wi fi protected access
Wi fi protected accessWi fi protected access
Wi fi protected access
 
Wireless Security
Wireless SecurityWireless Security
Wireless Security
 
Living in the Jungle: Legitimate users in Legitimate Insecure Wireless Networks
Living in the Jungle: Legitimate users in Legitimate Insecure Wireless NetworksLiving in the Jungle: Legitimate users in Legitimate Insecure Wireless Networks
Living in the Jungle: Legitimate users in Legitimate Insecure Wireless Networks
 
609 618
609 618609 618
609 618
 
Ch11 Hacking Wireless Networks it-slideshares.blogspot.com
Ch11 Hacking Wireless Networks it-slideshares.blogspot.comCh11 Hacking Wireless Networks it-slideshares.blogspot.com
Ch11 Hacking Wireless Networks it-slideshares.blogspot.com
 
wireless lan security.ppt
wireless lan security.pptwireless lan security.ppt
wireless lan security.ppt
 
Wi fi protected-access
Wi fi protected-accessWi fi protected-access
Wi fi protected-access
 
Attack Robustness and Security Enhancement with Improved Wired Equivalent Pro...
Attack Robustness and Security Enhancement with Improved Wired Equivalent Pro...Attack Robustness and Security Enhancement with Improved Wired Equivalent Pro...
Attack Robustness and Security Enhancement with Improved Wired Equivalent Pro...
 

More from arjunenterprises1978

In what ways does interferon eliminate pathogensSolutionInter.pdf
In what ways does interferon eliminate pathogensSolutionInter.pdfIn what ways does interferon eliminate pathogensSolutionInter.pdf
In what ways does interferon eliminate pathogensSolutionInter.pdfarjunenterprises1978
 
In 2006 you joined a group of 20 Richland College graduates to start.pdf
In 2006 you joined a group of 20 Richland College graduates to start.pdfIn 2006 you joined a group of 20 Richland College graduates to start.pdf
In 2006 you joined a group of 20 Richland College graduates to start.pdfarjunenterprises1978
 
If the leader has been dealing with the follower appropriately by us.pdf
If the leader has been dealing with the follower appropriately by us.pdfIf the leader has been dealing with the follower appropriately by us.pdf
If the leader has been dealing with the follower appropriately by us.pdfarjunenterprises1978
 
How does the structure of vertebrae aid in their functionSoluti.pdf
How does the structure of vertebrae aid in their functionSoluti.pdfHow does the structure of vertebrae aid in their functionSoluti.pdf
How does the structure of vertebrae aid in their functionSoluti.pdfarjunenterprises1978
 
Homework W1 Homew Score 0 of 1 pt 9.4.17 X Determine the vo.pdf
Homework W1 Homew Score 0 of 1 pt 9.4.17 X Determine the vo.pdfHomework W1 Homew Score 0 of 1 pt 9.4.17 X Determine the vo.pdf
Homework W1 Homew Score 0 of 1 pt 9.4.17 X Determine the vo.pdfarjunenterprises1978
 
Explain the security implications of HIPPA requirements for hospital.pdf
Explain the security implications of HIPPA requirements for hospital.pdfExplain the security implications of HIPPA requirements for hospital.pdf
Explain the security implications of HIPPA requirements for hospital.pdfarjunenterprises1978
 
Explain briefly about the major enhancements in ARM processor archite.pdf
Explain briefly about the major enhancements in ARM processor archite.pdfExplain briefly about the major enhancements in ARM processor archite.pdf
Explain briefly about the major enhancements in ARM processor archite.pdfarjunenterprises1978
 
Chapter Cellular Structure and Function Wor which consist of fatty ac.pdf
Chapter Cellular Structure and Function Wor which consist of fatty ac.pdfChapter Cellular Structure and Function Wor which consist of fatty ac.pdf
Chapter Cellular Structure and Function Wor which consist of fatty ac.pdfarjunenterprises1978
 
Ellen died with the following property house in joint tenancy wi.pdf
Ellen died with the following property house in joint tenancy wi.pdfEllen died with the following property house in joint tenancy wi.pdf
Ellen died with the following property house in joint tenancy wi.pdfarjunenterprises1978
 
essages in the process of communication. Active listening is very im.pdf
essages in the process of communication. Active listening is very im.pdfessages in the process of communication. Active listening is very im.pdf
essages in the process of communication. Active listening is very im.pdfarjunenterprises1978
 
Ed Norton, a city maintenance worker, is inspecting a sewer line. To.pdf
Ed Norton, a city maintenance worker, is inspecting a sewer line. To.pdfEd Norton, a city maintenance worker, is inspecting a sewer line. To.pdf
Ed Norton, a city maintenance worker, is inspecting a sewer line. To.pdfarjunenterprises1978
 
Can -1^ (14) be expressed in terms of iSolutionTo express (-1.pdf
Can -1^ (14) be expressed in terms of iSolutionTo express (-1.pdfCan -1^ (14) be expressed in terms of iSolutionTo express (-1.pdf
Can -1^ (14) be expressed in terms of iSolutionTo express (-1.pdfarjunenterprises1978
 
digestive disorders of the GI tractSolutionThe two common dige.pdf
digestive disorders of the GI tractSolutionThe two common dige.pdfdigestive disorders of the GI tractSolutionThe two common dige.pdf
digestive disorders of the GI tractSolutionThe two common dige.pdfarjunenterprises1978
 
Define ionophore and describe how the compound A23187 affects intrac.pdf
Define ionophore and describe how the compound A23187 affects intrac.pdfDefine ionophore and describe how the compound A23187 affects intrac.pdf
Define ionophore and describe how the compound A23187 affects intrac.pdfarjunenterprises1978
 
Describe how a prioritized set of system requirements is developed i.pdf
Describe how a prioritized set of system requirements is developed i.pdfDescribe how a prioritized set of system requirements is developed i.pdf
Describe how a prioritized set of system requirements is developed i.pdfarjunenterprises1978
 
Consider the equation 1 2x = sin x. (a) Use the Intermediate Val.pdf
Consider the equation 1  2x = sin x. (a) Use the Intermediate Val.pdfConsider the equation 1  2x = sin x. (a) Use the Intermediate Val.pdf
Consider the equation 1 2x = sin x. (a) Use the Intermediate Val.pdfarjunenterprises1978
 
A binary encoded signal has a bit-rate of Rb = 28 kbps. An Alternate .pdf
A binary encoded signal has a bit-rate of Rb = 28 kbps. An Alternate .pdfA binary encoded signal has a bit-rate of Rb = 28 kbps. An Alternate .pdf
A binary encoded signal has a bit-rate of Rb = 28 kbps. An Alternate .pdfarjunenterprises1978
 
15.) What kind of reaction occurs between Sudan III and hydrophobic .pdf
15.) What kind of reaction occurs between Sudan III and hydrophobic .pdf15.) What kind of reaction occurs between Sudan III and hydrophobic .pdf
15.) What kind of reaction occurs between Sudan III and hydrophobic .pdfarjunenterprises1978
 
1.) a.What was the original definition of a virus before it could be.pdf
1.) a.What was the original definition of a virus before it could be.pdf1.) a.What was the original definition of a virus before it could be.pdf
1.) a.What was the original definition of a virus before it could be.pdfarjunenterprises1978
 
1.Is the following discrete or continuous, number of brothers a pers.pdf
1.Is the following discrete or continuous, number of brothers a pers.pdf1.Is the following discrete or continuous, number of brothers a pers.pdf
1.Is the following discrete or continuous, number of brothers a pers.pdfarjunenterprises1978
 

More from arjunenterprises1978 (20)

In what ways does interferon eliminate pathogensSolutionInter.pdf
In what ways does interferon eliminate pathogensSolutionInter.pdfIn what ways does interferon eliminate pathogensSolutionInter.pdf
In what ways does interferon eliminate pathogensSolutionInter.pdf
 
In 2006 you joined a group of 20 Richland College graduates to start.pdf
In 2006 you joined a group of 20 Richland College graduates to start.pdfIn 2006 you joined a group of 20 Richland College graduates to start.pdf
In 2006 you joined a group of 20 Richland College graduates to start.pdf
 
If the leader has been dealing with the follower appropriately by us.pdf
If the leader has been dealing with the follower appropriately by us.pdfIf the leader has been dealing with the follower appropriately by us.pdf
If the leader has been dealing with the follower appropriately by us.pdf
 
How does the structure of vertebrae aid in their functionSoluti.pdf
How does the structure of vertebrae aid in their functionSoluti.pdfHow does the structure of vertebrae aid in their functionSoluti.pdf
How does the structure of vertebrae aid in their functionSoluti.pdf
 
Homework W1 Homew Score 0 of 1 pt 9.4.17 X Determine the vo.pdf
Homework W1 Homew Score 0 of 1 pt 9.4.17 X Determine the vo.pdfHomework W1 Homew Score 0 of 1 pt 9.4.17 X Determine the vo.pdf
Homework W1 Homew Score 0 of 1 pt 9.4.17 X Determine the vo.pdf
 
Explain the security implications of HIPPA requirements for hospital.pdf
Explain the security implications of HIPPA requirements for hospital.pdfExplain the security implications of HIPPA requirements for hospital.pdf
Explain the security implications of HIPPA requirements for hospital.pdf
 
Explain briefly about the major enhancements in ARM processor archite.pdf
Explain briefly about the major enhancements in ARM processor archite.pdfExplain briefly about the major enhancements in ARM processor archite.pdf
Explain briefly about the major enhancements in ARM processor archite.pdf
 
Chapter Cellular Structure and Function Wor which consist of fatty ac.pdf
Chapter Cellular Structure and Function Wor which consist of fatty ac.pdfChapter Cellular Structure and Function Wor which consist of fatty ac.pdf
Chapter Cellular Structure and Function Wor which consist of fatty ac.pdf
 
Ellen died with the following property house in joint tenancy wi.pdf
Ellen died with the following property house in joint tenancy wi.pdfEllen died with the following property house in joint tenancy wi.pdf
Ellen died with the following property house in joint tenancy wi.pdf
 
essages in the process of communication. Active listening is very im.pdf
essages in the process of communication. Active listening is very im.pdfessages in the process of communication. Active listening is very im.pdf
essages in the process of communication. Active listening is very im.pdf
 
Ed Norton, a city maintenance worker, is inspecting a sewer line. To.pdf
Ed Norton, a city maintenance worker, is inspecting a sewer line. To.pdfEd Norton, a city maintenance worker, is inspecting a sewer line. To.pdf
Ed Norton, a city maintenance worker, is inspecting a sewer line. To.pdf
 
Can -1^ (14) be expressed in terms of iSolutionTo express (-1.pdf
Can -1^ (14) be expressed in terms of iSolutionTo express (-1.pdfCan -1^ (14) be expressed in terms of iSolutionTo express (-1.pdf
Can -1^ (14) be expressed in terms of iSolutionTo express (-1.pdf
 
digestive disorders of the GI tractSolutionThe two common dige.pdf
digestive disorders of the GI tractSolutionThe two common dige.pdfdigestive disorders of the GI tractSolutionThe two common dige.pdf
digestive disorders of the GI tractSolutionThe two common dige.pdf
 
Define ionophore and describe how the compound A23187 affects intrac.pdf
Define ionophore and describe how the compound A23187 affects intrac.pdfDefine ionophore and describe how the compound A23187 affects intrac.pdf
Define ionophore and describe how the compound A23187 affects intrac.pdf
 
Describe how a prioritized set of system requirements is developed i.pdf
Describe how a prioritized set of system requirements is developed i.pdfDescribe how a prioritized set of system requirements is developed i.pdf
Describe how a prioritized set of system requirements is developed i.pdf
 
Consider the equation 1 2x = sin x. (a) Use the Intermediate Val.pdf
Consider the equation 1  2x = sin x. (a) Use the Intermediate Val.pdfConsider the equation 1  2x = sin x. (a) Use the Intermediate Val.pdf
Consider the equation 1 2x = sin x. (a) Use the Intermediate Val.pdf
 
A binary encoded signal has a bit-rate of Rb = 28 kbps. An Alternate .pdf
A binary encoded signal has a bit-rate of Rb = 28 kbps. An Alternate .pdfA binary encoded signal has a bit-rate of Rb = 28 kbps. An Alternate .pdf
A binary encoded signal has a bit-rate of Rb = 28 kbps. An Alternate .pdf
 
15.) What kind of reaction occurs between Sudan III and hydrophobic .pdf
15.) What kind of reaction occurs between Sudan III and hydrophobic .pdf15.) What kind of reaction occurs between Sudan III and hydrophobic .pdf
15.) What kind of reaction occurs between Sudan III and hydrophobic .pdf
 
1.) a.What was the original definition of a virus before it could be.pdf
1.) a.What was the original definition of a virus before it could be.pdf1.) a.What was the original definition of a virus before it could be.pdf
1.) a.What was the original definition of a virus before it could be.pdf
 
1.Is the following discrete or continuous, number of brothers a pers.pdf
1.Is the following discrete or continuous, number of brothers a pers.pdf1.Is the following discrete or continuous, number of brothers a pers.pdf
1.Is the following discrete or continuous, number of brothers a pers.pdf
 

Recently uploaded

Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxAnaBeatriceAblay2
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxUnboundStockton
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 

Recently uploaded (20)

Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 

1 EAP and 802.1X are usually associated with aRADIUS server2To.pdf

  • 1. 1: EAP and 802.1X are usually associated with a RADIUS server 2:To set up an extra access point to detect intruders is called using a _______. fly paper 3:Disabling an SSID broadcast is a common option in some wireless 802.11 NICs.802.11 b Access Point Solution solution to question 1- EAP and 802.1X are usually associated with a WEP Wired Equivalent Privacy (WEP), which is part of the original 802.11 standard, should provide confidentiality. Unfortunately WEP is poorly designed and easily cracked. There is no authentication mechanism, only a weak form of access control. As a response to WEP broken security, IEEE has come up with a new wireless security standard named 802.11i. 802.1X plays a major role in this new standard. The new security standard, 802.11i, which was ratified in June 2004, fixes all WEP weaknesses. It is divided into three main categories: The industry didn't have time to wait until the 802.11i standard was completed. They wanted the WEP issues fixed now! Wi-Fi Alliance felt the pressure, took a "snapshot" of the standard , and called it Wi-Fi Protected Access (WPA). One requirement was that existing 802.11 equipment could be used with WPA, so WPA is basically TKIP + 802.1X. Extensible Authentication Protocol (EAP) is just the transport protocol optimized for authentication, not the authentication method itself SOLUTION TO QUESTION2-To set up an extra access point to detect intruders is called using a HONEYPOT A honeypot is a computer system that is set up to act as a decoy to lure cyberattackers, and to detect, deflect or study attempts to gain unauthorized access to information systems. SOLUTION TO QUESTION 3- One of the most common security recommendations regarding wireless networks is that you should disable SSID broadcasting Temporary Key Integrity Protocol (TKIP) is a short-term solution that fixes all WEP weaknesses. TKIP can be used with old 802.11 equipment (after a driver/firmware upgrade) and provides integrity and confidentiality. Counter Mode with CBC-MAC Protocol (CCMP) is a new protocol, designed from ground up. It
  • 2. uses AES as its cryptographic algorithm, and, since this is more CPU intensive than RC4 (used in WEP and TKIP), new 802.11 hardware may be required. Some drivers can implement CCMP in software. CCMP provides integrity and confidentiality. 802.1X Port-Based Network Access Control: Either when using TKIP or CCMP, 802.1X is used for authentication.