COMPLETE SOLUTIONS GRADED A++ LATEST UPDATE
There are several types of security zones on a network. Analyze network
activities to determine which of the following does NOT represent a security zone.
Screened host
A company is reviewing the options for installing a new wireless network. They
have requested recommendations for utilizing WEP, WPA, or WPA2. Differentiate
between Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA).
Determine which of the following statements accurately distinguishes between
the options. (Select all that apply.)
-WPA2/3 is the strongest encryption scheme, followed by WPA, then WEP. WPA2 is
difficult to crack if protected by a strong password, or if deploying enterprise
authentication. WEP is more vulnerable to decryption due to replay attack possibilities.
-WPA and WEP use RC4, while WEP uses a 24-bit Initialization Vector (IV). WPA uses
a Temporal Key Integrity Protocol (TKIP), and WPA2 uses an Advanced Encryption
Standard (AES) for encryption.
Given that layer 2 does not recognize Time to Live, evaluate the potential
problems to determine which of the following options prevents this issue.
STP
A network manager suspects that a wireless network is undergoing a
deauthentication attack. Applying knowledge of wireless network attacks, which
scenario best supports the network manager's suspicion?