Name two common wireless security protocols and a known vulnerability affecting one.

Study for the Jason Dion's Network+ Course. Prepare with flashcards and multiple choice questions, each question has hints and explanations. Get ready for your exam!

Multiple Choice

Name two common wireless security protocols and a known vulnerability affecting one.

Explanation:
This question tests you on two things: common wireless security protocols and a well-known flaw that affected one of them. WEP and WPA are two widely cited, older wireless security protocols. WEP is famously insecure due to weak encryption and short initialization vectors, and WPA was introduced as an improvement but later found to have its own weaknesses. The notable vulnerability, KRACK, targets the WPA2 four-way handshake, letting an attacker manipulate that handshake to reinstall keys and decrypt, replay, or inject traffic on nearby networks. Because KRACK specifically exploits WPA2, pairing two well-known legacy protocols (WEP and WPA) with a vulnerability that is famous for WPA2 matches real-world risk: it shows the idea that older protocols are insecure and that the real dramatic flaw lies in WPA2’s handshake. The other options mix up which protocol KRACK affects or pair the vulnerability with newer versions in a way that doesn’t reflect the common, practical risk seen in the wild.

This question tests you on two things: common wireless security protocols and a well-known flaw that affected one of them. WEP and WPA are two widely cited, older wireless security protocols. WEP is famously insecure due to weak encryption and short initialization vectors, and WPA was introduced as an improvement but later found to have its own weaknesses. The notable vulnerability, KRACK, targets the WPA2 four-way handshake, letting an attacker manipulate that handshake to reinstall keys and decrypt, replay, or inject traffic on nearby networks. Because KRACK specifically exploits WPA2, pairing two well-known legacy protocols (WEP and WPA) with a vulnerability that is famous for WPA2 matches real-world risk: it shows the idea that older protocols are insecure and that the real dramatic flaw lies in WPA2’s handshake. The other options mix up which protocol KRACK affects or pair the vulnerability with newer versions in a way that doesn’t reflect the common, practical risk seen in the wild.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy