|For users to authenticate with an Access Point using WEP, users have to have what?
||Users have to have the correct WEP key.
|Packet sniffing can be used to obtain username and password information in clear text from what type of protocol? ||FTP (File Transport Protocol).|
|What should be your greatest concern when transferring files or authenticating to a FTP server? ||Your greatest concern should be that the data and/or authentication information is being sent in clear text.|
|Users of Instant Messaging clients are especially prone to what? ||Sniffing Attacks.|
|What mode does IPSec use on routers when connecting from the corporate office to the branch office? ||Tunnel Mode.|
|Data integrity is best achieved using what?
||Message Digest (MD-5) 128 Bit Signing
|Major components of ISAKMP are? ||Authentication of peers, threat management, security association, cryptographic key establishment and management.|
|When a user digitally signs a document, an asymmetric algorithm is used to encrypt what? ||Hash results.|
|Which type of password generator is based on challenge-response mechanisms? ||Asynchronous|
|What protocol would an administrator use to administer, via telnet, a remote server so his password is not in clear text? ||SSH|
|What physical access control most adequately protects against physical piggybacking? ||Man Trap|