After answering the following questions, change the name of your file to
and copy your file to the correct folder on
Do all your work on your desktop. Do
use a flash drive or any Internet resources.
was the name of the original IEEE standard for
How do most wireless access points
access from a remote device?
dia access control filtering
What is the purpose of WEP?
Use to encrypt packets with 64 bit or 128 bit numbers.
Describe the process WEP uses to encrypt data.
WEP take unencrypted text and encrypts it by scrambling it into a text that cannot be
What is the SSID and how is it used for authentication?
The SSID is associated with the packets and the beaconing of the system.
Why is MAC address filtering considered weak?
ryption patterns allow for the
packets to be compromised.
Why is WEP considered to be weak?
It create initialization vectors that make detectable patterns
PSK serves two purposes. What are they?
Preshared key create
Explain the difference between the
three terms: identification, authentication, and
the basic level of who the user is.
the verifying of the users credentials
the granting of access to users.
Of the access control models di
scussed in class, which one is closest to “group
What does the “enforce password history” policy do?
This policy creates a block on previously used passwords.
What does the “maximum password age” policy do?
amount of days that the password will be valid before its time is up.
If “enforce password history” is set to 12 and “maximum password age” is set to 10,
then how many days must elapse before a user can reuse a previous password?
ibe how a time
time password with a token works.
The password is initially obtained then the token. The token responds to an authentication server
to validate the password within a framed period of time.
How can the above password s
ystem be compromised?
It can be hacked.
Explain how keystroke dynamics might be used to authenticate a user.
It’s a system that can determine the user base upon the flight of the keystroke and the amount of
time a keystroke is held.
example of cognitive biometrics that can be used to authenticate a user.
An example of cognitive biometrics would be a authentication based upon something about that
person or something related to that person that they can identify.
What is an
advantage of VPN?
Its saves cost, it also provides a greater level of security, and the speed.
What is an disadvantage of VPN?
a disadvantage of VPN is the
overall management of it.