2.2: Wireless Security Flashcards

1
Q
  1. (2.2)
    Which wireless authentication method is a common AAA protocol, centralises authentication for users and is available on almost any server operating system?

a. TACACS+
b. Kerberos
c. RADIUS
d. MFA

A

c. RADIUS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. (2.2)
    Which wireless protocol uses GCMP encryption and MIC (message integrity check) with GMAC?

a. TKIP
b. WPA2
c. AES
d. WPA3

A

d. WPA3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  1. (2.2)
    Which wireless authentication method is a remote authentication protocol relating to Cisco devices?

a. TACACS+
b. Kerberos
c. RADIUS
d. MFA

A

a. TACACS+

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  1. (2.2)
    Which wireless protocol uses CCMP block cipher mode and MIC (Message Integrity Check) with CBC-MAC?

a. TKIP
b. WPA2
c. AES
d. WPA3

A

b. WPA2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  1. (2.2)
    Which wireless authentication method enables SSO for Windows?

a. TACACS+
b. Kerberos
c. RADIUS
d. MFA

A

b. Kerberos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  1. (2.2)
    Which wireless protocol uses SAE (Simultaneous Authentication of Equals) / the dragonfly handshake?

a. TKIP
b. WPA2
c. AES
d. WPA3

A

d. WPA3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  1. (2.2)
    Which wireless protocol uses a four way handshake and is vulnerable to brute force attacks?

a. TKIP
b. WPA2
c. AES
d. WPA3

A

b. WPA2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly