2.3 - Compare and contrast wireless security protocols and authentication methods. Flashcards
1
Q
Wireless encryption.
A

2
Q
WPA.
A

3
Q
Temporal Key Integrity Protocol.
A

4
Q
WPA2 and CCMP.
A

5
Q
Wireless security modes.
A

6
Q
RADIUS.
A

7
Q
TACACS.
A
