16-B Flashcards
(26 cards)
What is the main purpose of wireless security protocols?
To ensure only authorized users operate devices on the network
What is the main problem with wireless traffic?
It is unguided, allowing interception if unencrypted
What does WPA stand for?
Wi-Fi Protected Access
What cipher does the first version of WPA use?
RC4 symmetric cipher
What protocol does WPA use to mitigate attacks against WEP?
Temporal Key Integrity Protocol (TKIP)
What encryption standard does WPA2 use?
Advanced Encryption Standard (AES)
What protocol replaces TKIP in WPA2?
Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP)
What is a key vulnerability of WPA?
Vulnerable to replay attacks
What mechanism does WPA3 use for authentication?
Simultaneous Authentication of Equals (SAE)
What type of encryption does WPA3 use for management frames?
Encryption mandated for management frames
True or False: WPA3 encrypts traffic on open Wi-Fi networks.
True
What are the three types of Wi-Fi authentication methods?
- Open
- Personal
- Enterprise
What is the passphrase used for in WPA2 Pre-Shared Key (PSK) authentication?
To generate the key for encrypting communications
What is the minimum passphrase length recommended for WPA2-PSK?
At least 14 characters
What does WPA3 Personal Authentication replace in WPA2?
4-way handshake with SAE protocol
What are the main advantages of enterprise authentication over personal authentication?
- Secure distribution of credentials
- Accounting for individual users
What does EAP stand for?
Extensible Authentication Protocol
What is the role of an AAA server in enterprise authentication?
To validate user credentials and manage authentication
What is the first factor in EAP-TLS authentication?
User authentication with a PIN, password, or bio gesture
What is the second factor in EAP-TLS authentication?
Validation of the server’s digital signature and certificate
What does RADIUS stand for?
Remote Authentication Dial-in User Service
What is TACACS+ primarily used for?
Authenticating administrative access to network devices
True or False: Kerberos is directly supported by access points.
False
Fill in the blank: WPA2-Personal uses _______ authentication.
[pre-shared key (PSK)]