Save
computing
networking
wireless encyption
Save
Share
Learn
Content
Leaderboard
Share
Learn
Created by
izzy
Visit profile
Cards (15)
What identifies wireless networks uniquely?
Service Set Identifier (SSID)
View source
Why must devices use the SSID?
To connect to the
wireless
network
View source
How can the SSID be set for a wireless network?
It can be
broadcast
automatically
View source
What can be done to make the SSID harder to detect?
It
can
be
hidden
View source
How can a wireless network be secured?
By using a
password
View source
What must be done to secure data in wireless networks?
Data must be
encrypted
View source
How is data encrypted in wireless networks?
By scrambling it into
ciphertext
View source
What is used to create the master key for encryption?
Network’s
SSID
and password
View source
How is data decrypted by the receiver?
Using the same
master key
View source
What are the wireless encryption protocols mentioned?
WEP
,
WPA
, and
WPA2
View source
What is the purpose of a handshake protocol in wireless encryption?
To ensure the receiver has a valid
master key
View source
Why are wired networks considered more secure?
They are less susceptible to
interception
View source
What does the term ciphertext refer to?
Scrambled data that is
encrypted
View source
What is the relationship between the master key and the encrypted data?
The master key
decrypts
the encrypted data
View source
How does encryption enhance wireless network security?
It prevents
unauthorized
access
to data
View source