16-B Flashcards

(26 cards)

1
Q

What is the main purpose of wireless security protocols?

A

To ensure only authorized users operate devices on the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the main problem with wireless traffic?

A

It is unguided, allowing interception if unencrypted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does WPA stand for?

A

Wi-Fi Protected Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What cipher does the first version of WPA use?

A

RC4 symmetric cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What protocol does WPA use to mitigate attacks against WEP?

A

Temporal Key Integrity Protocol (TKIP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What encryption standard does WPA2 use?

A

Advanced Encryption Standard (AES)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What protocol replaces TKIP in WPA2?

A

Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a key vulnerability of WPA?

A

Vulnerable to replay attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What mechanism does WPA3 use for authentication?

A

Simultaneous Authentication of Equals (SAE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What type of encryption does WPA3 use for management frames?

A

Encryption mandated for management frames

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

True or False: WPA3 encrypts traffic on open Wi-Fi networks.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the three types of Wi-Fi authentication methods?

A
  • Open
  • Personal
  • Enterprise
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the passphrase used for in WPA2 Pre-Shared Key (PSK) authentication?

A

To generate the key for encrypting communications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the minimum passphrase length recommended for WPA2-PSK?

A

At least 14 characters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does WPA3 Personal Authentication replace in WPA2?

A

4-way handshake with SAE protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the main advantages of enterprise authentication over personal authentication?

A
  • Secure distribution of credentials
  • Accounting for individual users
17
Q

What does EAP stand for?

A

Extensible Authentication Protocol

18
Q

What is the role of an AAA server in enterprise authentication?

A

To validate user credentials and manage authentication

19
Q

What is the first factor in EAP-TLS authentication?

A

User authentication with a PIN, password, or bio gesture

20
Q

What is the second factor in EAP-TLS authentication?

A

Validation of the server’s digital signature and certificate

21
Q

What does RADIUS stand for?

A

Remote Authentication Dial-in User Service

22
Q

What is TACACS+ primarily used for?

A

Authenticating administrative access to network devices

23
Q

True or False: Kerberos is directly supported by access points.

24
Q

Fill in the blank: WPA2-Personal uses _______ authentication.

A

[pre-shared key (PSK)]

25
What security method is configured on access points for enterprise authentication?
* WPA2-Enterprise * WPA3-Enterprise
26
What does WPA2-TKIP allow for?
Support for legacy clients at the expense of security