exam questions

Exam 312-50v11 All Questions

View all questions & answers for the 312-50v11 exam

Exam 312-50v11 topic 1 question 204 discussion

Actual exam question from ECCouncil's 312-50v11
Question #: 204
Topic #: 1
[All 312-50v11 Questions]

This wireless security protocol allows 192-bit minimum-strength security protocols and cryptographic tools to protect sensitive data, such as GCMP-256, HMAC-
SHA384, and ECDSA using a 384-bit elliptic curve.
Which is this wireless security protocol?

  • A. WPA3-Personal
  • B. WPA3-Enterprise
  • C. WPA2-Enterprise
  • D. WPA2-Personal
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
cerzocuspi
Highly Voted 2 years ago
WPA3 - Enterprise It protects sensitive data using many cryptographic algorithms It provides authenticated encryption using GCMP-256 It uses HMAC-SHA-384 to generate cryptographic keys It uses ECDSA-384 for exchanging keys
upvoted 15 times
...
Daniel8660
Most Recent 6 months, 3 weeks ago
Selected Answer: B
WPA3-Enterprise protects sensitive data using many cryptographic algorithms. Provides authenticated encryption using GCMP-256, uses HMAC-SHA-384 to generate cryptographic keys, uses ECDSA-384 for exchanging keys. (P.2207/2191)
upvoted 3 times
...
KruHacker01
1 year, 2 months ago
Selected Answer: B
WPA3 - Enterprise It protects sensitive data using many cryptographic algorithms It provides authenticated encryption using GCMP-256 It uses HMAC-SHA-384 to generate cryptographic keys It uses ECDSA-384 for exchanging keys
upvoted 2 times
...
Jasonxxx
1 year, 4 months ago
Selected Answer: B
B. WPA3-Enterprise
upvoted 1 times
...
Novmejst
1 year, 4 months ago
B. WPA3-Enterprise
upvoted 2 times
...
gokhansah1n
1 year, 5 months ago
HMAC is used for authenticity of the sender since it calculates the hash of the message appended with private key of the sender. AES GCMP-256 is used for symmetric key encryption to ensure the confidentiality of the messages that were sent and received. The key generation algorithm is included in AES, it is not accomplished with HMAC. ECDSA-384 is used to encrypt master symmetric key that were used to generate round keys in AES.
upvoted 2 times
...
brdweek
1 year, 6 months ago
Correct
upvoted 1 times
...
ANDRESCB1988
1 year, 9 months ago
correct
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago