Which security protocol uses a Message Integrity Check to ensure data integrity?

Prepare for the CompTIA A+ Core 1 (220-1201) Exam. Engage with flashcards and multiple-choice questions, with hints and explanations for each. Ace your exam!

The correct choice is Wi-Fi Protected Access (WPA), which employs a Message Integrity Check (MIC) as part of its security protocol to ensure data integrity. This is crucial in wireless communications as it helps to protect the data being transmitted over the network from being tampered with or altered by unauthorized parties.

WPA's MIC provides a way to verify that the data received is exactly what was sent, without any modifications, which directly contributes to maintaining the authenticity and reliability of the data being exchanged. By including a mechanism for integrity checking, WPA enhances the overall security framework beyond what was offered by its predecessor, Wired Equivalent Privacy (WEP), which lacks robust safeguards against data tampering.

While other options like Wired Equivalent Privacy and Wi-Fi Protected Access 2 also relate to wireless security, they implement different levels of security features and integrity checks. WPA2, for instance, offers stronger encryption and integrity measures than WPA but also employs a MIC. The Pre-Shared Key method relates to the way devices authenticate to the network rather than specifically addressing data integrity. Thus, it's essential to recognize that the presence of a Message Integrity Check is a defining feature of the WPA security protocol, affirming its role in ensuring the integrity of transmitted data.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy