A. Incorrect. This is an SSID.
B. Incorrect. This doesn't describe encryption, something that uses a password to connect to an access point is a client.
So it's C or D.
I don't think it's D because encryption doesn't "use authentication protocols", that's something like 802.1x. Which leaves us with C; but this isn't really a good description of encryption either. Still, I think it's the right answer. Why?
Because Cisco refers to *cryptographic protocols* CCMP and GCMP as simply "encryption". These protocols involve integrity checks; CBC-MAC and GMAC respectively.
Sources:
https://www.cisco.com/c/en/us/support/docs/wireless/catalyst-9800-series-wireless-controllers/220712-configure-and-verify-wi-fi-6e-wlan-layer.html#toc-hId-394597201
https://en.wikipedia.org/wiki/Galois/Counter_Mode
https://en.wikipedia.org/wiki/CCMP_(cryptography)
C. uses integrity checks to identify forgery attacks in the frame.
Encryption in wireless networks is a security mechanism used to protect data transmitted over wireless networks from unauthorized access. Encryption involves converting plain text into cipher text using a cryptographic algorithm and a key. The encrypted data is then transmitted over the wireless network and can only be decrypted by authorized recipients who possess the key. One of the features of encryption is the use of integrity checks to identify forgery attacks in the frame, ensuring that the data has not been tampered with during transmission.
Whilst investigating this answer from JJY888 which I thought was the best answer so far I found these notes
https://networklessons.com/cisco/ccna-200-301/wireless-encryption-and-integrity
https://networklessons.com/cisco/ccna-200-301/wireless-authentication-methods
extract from 1st link
In this lesson, we’ll take a look at some of the other algorithms and protocols to encrypt and protect the integrity of wireless traffic.
That means D to me.
Holy Jeez why cant any of these Q's be a little more clear!!
Encryption in wireless networks ensures data confidentiality and integrity. Protocols like WPA2 use integrity checks (e.g., CCMP) to prevent forgery or modification of frames during transmission.
Uses authentication protocols to secure the network: This option is not correct. Using authentication protocols to secure the network means authentication, not encryption.
Similar answer from ChatGPT & Bard:
C. uses integrity checks to identify forgery attacks in the frame
Explanation: Encryption in wireless networks not only secures data by encoding it but also includes integrity checks to detect any unauthorized alterations or forgery of the data during transmission. This helps ensure the data's integrity and authenticity.
The other options are not accurate descriptions of encryption in wireless networks:
A. Identifying an access point is the role of an SSID, not encryption.
B. Using a password for connection is related to authentication, not encryption.
D. Authentication protocols are separ
ate from encryption, although both are important security aspects in wireless networks. Encryption focuses on data confidentiality, while authentication verifies the identity of users or devices trying to connect to the network.
C. uses integrity checks to identify forgery attacks in the frame --> IPsec
D. uses authentication protocols to secure a network --> WPA、WPA2、WPA3...
ChatGPT:
The statement "uses integrity checks to identify forgery attacks in the frame" is incorrect because using integrity checks to identify forgery attacks is not a characteristic of encryption in wireless networks. Integrity checks are used to verify whether data has been altered or corrupted during transmission and are typically implemented by certain protocols or security mechanisms like IPsec. In wireless networks, encryption is primarily used to ensure data confidentiality, not integrity.
WPA, WPA2, and WPA3 are encryption features in wireless networks. These protocols all use authentication and encryption to secure the wireless network, ensuring that only authorized users can connect and access the network. The encryption functionality prevents unauthorized users from eavesdropping on network communications, safeguarding users' personal information and data security.
D is correct. Wireless encryption uses authentication protocols to secure your wireless network
https://www.geeksforgeeks.org/wireless-encryption-methods-in-cisco/
C is correct
The correct characteristic of encryption in wireless networks is that it uses integrity checks to identify forgery attacks in the frame. Encryption is the process of encoding data to make it unreadable to unauthorized parties. In the context of wireless networks, encryption is used to secure the communication between devices and access points.
I think it's D : Wireless encryption uses authentication protocols to secure your wireless network. A password or network key is required when a user or device attempts to connect.
While I don't like the wording of any of these answers C sounds more right. It really used to stop people from intercepting messages sent over a wireless network. In a way it keeps the integrity of the message
Encryption can also be used to verify the identity of the communicating parties by requiring the use of authentication protocols, such as WPA2-PSK or EAP-TLS, to establish a secure connection.
Answer is C, its encryption, D is about authentication
upvoted 3 times
...
...
...
This section is not available anymore. Please use the main Exam Page.200-301 Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
[Removed]
Highly Voted 1 year, 4 months agoexiledwl
7 months agoJJY888
Highly Voted 1 year, 11 months agoPaddyInNZ
1 year, 5 months agoJulesAZ
1 year, 2 months agoShaifalimittal02
Most Recent 7 months, 2 weeks ago[Removed]
1 year agokalitwol
1 year ago[Removed]
1 year, 6 months agoolofinluajoshua
1 year, 7 months ago4Lucky711
1 year, 8 months ago4Lucky711
1 year, 8 months agoandrizo
1 year, 8 months agoShri_Fcb10
1 year, 9 months agosam225555
1 year, 9 months agoNeoSam999
1 year, 10 months ago[Removed]
1 year, 10 months agoBhrino
1 year, 11 months agoPaddyInNZ
1 year, 5 months agoac89l
1 year, 11 months agoac89l
1 year, 11 months agostudying_1
1 year, 11 months ago