CompTIA Security+ Exam: Hands-on Wireless Security - Configuration for Weak Protocol Attack

Configure Test Access Point for Weak Protocol Attack

Prev Question Next Question

Question

An instructor is teaching a hands-on wireless security class and needs to configure a test access point to show students an attack on a weak protocol.

Which of the following configurations should the instructor implement?

Answers

Explanations

Click on the arrows to vote for the correct answer

A. B. C. D.

D.

The instructor should configure the test access point to use WEP as the wireless security protocol. WEP stands for Wired Equivalent Privacy, and it is the weakest of the wireless security protocols. It uses a static encryption key, which means that once an attacker captures the key, they can easily decode any data transmitted over the network.

WPA, or Wi-Fi Protected Access, is a stronger wireless security protocol than WEP. It uses a more robust encryption algorithm, and it also includes a mechanism for mutual authentication between the access point and the client devices.

WPA2 is an even stronger version of WPA that uses the Advanced Encryption Standard (AES) encryption algorithm, which is considered very secure.

EAP, or Extensible Authentication Protocol, is not a wireless security protocol in itself, but rather a framework for authenticating devices on a network. EAP can be used in conjunction with other wireless security protocols such as WPA and WPA2 to provide stronger authentication mechanisms.

In conclusion, the instructor should configure the test access point to use WEP as the wireless security protocol to demonstrate the vulnerability of this protocol to the students.