1 IDENTIFY AND DESCRIBE THE FOLLOWING WLAN SECURITY TECHNIQUES. 10SS...

6.1 Identify and describe the following WLAN security techniques. 10SSID hiding; Legacy security mechanisms: WEP and MAC filtering; User-based security: 802.1X/EAP and RADIUS authentication; Passphrase-based security; Push-button or PIN-based wireless security; Encryption – TKIP/CCMP; Role-based access control (RBAC); Virtual private networking (VPN); Wireless intrusion prevention systems (WIPS)