Question 1
In centralized authentication environments, which of the following is used to manage authentication?
Question 2
Which of the following is NOT a component of the AAA framework?
Question 3
What is a primary advantage of WPA3 over WPA2?
Question 4
Which protocol is widely supported in logging into routers and VPNs due to its longstanding use?
Question 5
Which encryption protocol uses a 4-way handshake during initial connection?
Question 6
Which of the following is a purpose of the Accounting component in the AAA framework?
Question 7
What is the purpose of the SAE in WPA3?
Question 8
What is the role of the authenticator in 802.1X?
Question 9
What does WPA3 use for stronger encryption over WPA2?
Question 10
In network access control (NAC) under 802.1X, what role does the supplicant take?
Question 11
In the EAP process, what step occurs after the supplicant attempts initial connection?
Question 12
What method of authentication is commonly used in home networks?
Question 13
Which term describes the centralized servers' management of network authentication?
Question 14
What vulnerability makes wireless communication particularly susceptible to eavesdropping?
Question 15
What protection does WPA3 offer against brute force attacks?