Scan QR code or get instant email to install app
Download ITEXAM Prep app now
Scan QR code or get instant email to install app
Question:
WPA (Wi-Fi Protected Access) uses the encryption protocol Temporal Key Integrity Protocol (TKIP) for wireless connections. By generating an unique key for each data frame, it was meant to replace WEP's weak encryption. Since then, it has been the target of wireless attacks, and large business does not accept it. Devices from different LANs can virtually connect and act as though they are connected to the same physical network, creating a VLAN (virtual LAN). A VPN (virtual private network) is similar since it uses encryption protocols to create a private tunnel via a public network. Someone working remotely might use a VPN to access a company server. The Advanced Encryption Standard (AES) is TKIP's successor. AES and TKIP work together in WPA2 (WPA, version 2).