Chapter 14

1. E. A secure wireless connection between a client and an AP should have all of the listed security components.

2. C. The message integrity check (MIC) is used to protect data against tampering.

3. D. Wireless Equivalent Privacy (WEP) is a wireless encryption method that has been found to be vulnerable and is not recommended for use.

4. A. Open authentication is used so that the client can associate with the AP and can then authenticate through 802.1x and EAP.

5. C. A controller becomes an authenticator in the 802.1x process.

6. B. PEAP uses a server certificate, but clients authenticate using more traditional means without a certificate.

7. D. EAP-TLS requires digital certificates on both the AS and the supplicants.

8. C. CCMP is ...

Get CCNA Wireless 640-722 Official Cert Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.