Session-4a: Wi-Fi Security Protocols
Email *
Full Name *
Which data integrity is used on WEP? *
1 point

Which of the following devices is an example of a supplicant?

*
1 point

How long is the IV (Initialization Vector) in WEP?

*
1 point

How long is the encryption key in WPA?

*
1 point

What is the purpose of MIC?

*
1 point

What does "OWE" stand for?

*
1 point

From the following, What does WPA2 use to prevent replay attacks?

*
1 point
What is the main purpose of a captive portal?
*
1 point
Which encryption method does WPA2 use?
*
1 point

What are the differences between personal and enterprise security among the following options?

*
1 point
Submit
Clear form
Never submit passwords through Google Forms.
This content is neither created nor endorsed by Google. Report Abuse - Terms of Service - Privacy Policy