ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 8 - ECSS discussion

Report
Export

Peter, a network defender, was instructed to protect the corporate network from unauthorized access. To achieve this, he employed a security solution for wireless communication that uses dragonfly key exchange for authentication, which is the strongest encryption algorithm that protects the network from dictionary and key recovery attacks.

Identify the wireless encryption technology implemented in the security solution selected by Peter in the above scenario.

A.

WPA

Answers
A.

WPA

B.

WPA3

Answers
B.

WPA3

C.

WEP

Answers
C.

WEP

D.

EAP

Answers
D.

EAP

Suggested answer: B

Explanation:

Peter's security solution for wireless communication uses thedragonfly key exchangefor authentication. This key exchange method is a crucial component ofWPA3(Wi-Fi Protected Access 3). WPA3 is an improved wireless security protocol that enhances protection against dictionary attacks and provides forward secrecy. The dragonfly handshake in WPA3 makes it impossible for attackers to record the 4-Way Handshake and launch offline dictionary attacks.Additionally, WPA3 introduces perfect forward secrecy, preventing attackers from decrypting past traffic after a key breach12.

EC-Council Certified Security Specialist (E|CSS) documents and study guide

EC-Council Certified Security Specialist (E|CSS) course materials3

asked 24/10/2024
Dereque Datson
41 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first