nerdexam
(ISC)2(ISC)2

CISSP-ISSAP · Question #34

CISSP-ISSAP Question #34: Real Exam Question with Answer & Explanation

Sign in or unlock CISSP-ISSAP to reveal the answer and full explanation for question #34. The question stem and answer options stay visible for context.

Infrastructure Security

Question

(ISC)2 CISSP-ISSAP Exam Adam works as a Network Administrator. He discovers that the wireless AP transmits 128 bytes of plaintext, and the station responds by encrypting the plaintext. It then transmits the resulting ciphertext using the same key and cipher that are used by WEP to encrypt subsequent network traffic. Which of the following types of authentication mechanism is used here?

Options

  • APre-shared key authentication
  • BOpen system authentication
  • CShared key authentication
  • DSingle key authentication

Unlock CISSP-ISSAP to see the answer

You've previewed enough free CISSP-ISSAP questions. Unlock CISSP-ISSAP for full answers, explanations, the timed quiz mode, progress tracking, and the master PDF. Question stem and options stay visible so you can still see what's on the exam.

Topics

#Wireless security#WEP#Shared key authentication#Network authentication
Full CISSP-ISSAP PracticeBrowse All CISSP-ISSAP Questions