Wireless Security Post author:Devendra Kumar Post published: Post comments:0 Comments 8. What are some weaknesses of the WEP scheme? Select all that apply. Answers Its poor key generation methodsIts small IV pool sizeIts use of ASCII characters for passphrasesIts use of the RC4 stream cipher 9. What symmetric encryption algorithm does WPA2 use? Answers AESDSADESRSA 10. How can you reduce the likelihood of WPS brute-force attacks? Check all that apply. Answers Use a very long and complex passphrase.Update firewall rules.Implement lockout periods for incorrect attempts.Disable WPS. 11. Select the most secure WiFi security configuration from below: Answers WPA enterpriseWPA2 personalWEP 128 bitWPA personalNoneWPA2 enterprise 12. What process authenticates clients to a network? Answers WPA2HMAC-SHA1TKIPFour-way handshake Previous Next Please Share This Share this content Opens in a new window Opens in a new window Opens in a new window Opens in a new window Opens in a new window Opens in a new window Opens in a new window Opens in a new window Opens in a new window Opens in a new window Devendra Kumar Project Management Apprentice at Google You Might Also Like Physical Infrastructure Services Project Management Terminology Leave a Reply Cancel replyCommentEnter your name or username to comment Enter your email address to comment Enter your website URL (optional) Save my name, email, and website in this browser for the next time I comment.