a. What is the main access control threat to Ethernet LANs? b. What is the main access control threat to wireless LANs? c. Why is the access control threat to wireless LANs more severe? d. Is eavesdropping usually a concern for wired LANs, wireless LANs, or both?
a. Why is 802.1X called Port-based Access Control? b. Where is the heavy authentication work done? c. What are the three benefits of using a central authentication server? d. Which device is the verifier? Explain. (Tricky question.) e. Which device is called the authenticator?
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here