3.4 Given a scenario, install and configure wireless security settings Flashcards

1
Q

Wi-Fi Protected Access (WPA2)

A

Wi-Fi Protected Access 2 (WPA2) is the name of the first official implementation of the 802.11i wireless security protocol standard developed by the IEEE. It has AES, a 128-bit symmetric block cipher that’s much more robust but is backward-compatible due to its inclusion of TKIP in its protocol suite. Like WPA, WPA2 also has two different implementations: WPA2-Personal (using a pre-shared key) and WPA2-Enterprise, which work the same way as they do in WPA.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Wi-Fi Protected Access 3 (WPA3)

A

WPA3 brings many improvements over WPA2. Most notably, Simultaneous Authentication of Equals (SAE) replaces PSK—at least for encryption. If you set up an “open” SSID with a WPA3-capable WAP, SAE automatically forces every WPA3-capable device connecting to that WAP to use a Diffie-Hellman–style authentication/encryption process. In other words, the day of the unencrypted wireless connection no longer exists in WPA3.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Counter-Mode/CBC-MAC Protocol (CCMP)

A

This mode is called the Counter Mode Cipher Block Chaining Message Authentication Code Protocol, which CompTIA shortens to Counter-mode/CBC-MAC Protocol (CCMP). CCMP uses a 128-bit key and 128-bit block size (since it is a block symmetric cipher, as opposed to the streaming RC4 symmetric cipher used in WEP and WPA), as well as 48-bit initialization vectors. The larger IV sizes help prevent replay attacks from being conducted against WPA2.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Simultaneous Authentication of Equals (SAE)

A

Most notably, Simultaneous Authentication of Equals (SAE) replaces PSK—at least for encryption. If you set up an “open” SSID with a WPA3-capable WAP, SAE automatically forces every WPA3-capable device connecting to that WAP to use a Diffie-Hellman–style authentication/encryption process. In other words, the day of the unencrypted wireless connection no longer exists in WPA3.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Extensible Authentication Protocol (EAP)

A

EAP recognizes that there are several different authentication methods, including certificate-based authentication and other multifactor authentication methods, such as smart cards and so on. EAP can still allow the traditional user name/password combination of authentication as well. EAP also allows for mutual authentication between devices as well as directory-based authentication services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Protected Extensible Authentication Protocol (PEAP)

A

Protected Extensible Authentication Protocol (PEAP), another version that uses TLS, addressed problems with EAP and was developed as an open protocol by several vendors, such as Microsoft, RSA, and Cisco. PEAP is similar to EAP-TLS and requires a digital certificate on the server side of a connection to create a secure TLS tunnel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

EAP-FAST

A

Cisco has replaced LEAP with EAP-FAST (for Flexible Authentication via Secure Tunneling), which addresses LEAP’s security issues. EAP-FAST is lightweight but uses TLS tunnels to add security during authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

EAP-TLS

A

EAP Transport Layer Security (EAP-TLS) was for years the primary EAP variation used on high-security wireless networks. As the name implies, EAP-TLS uses the same TLS protocol used on secure Web pages. EAP-TLS requires both a server-side certificate and a client-side certificate (client-side certificates are rarely used on Web pages, but the TLS protocol certainly supports their use).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

EAP-TTLS

A

EAP Tunneled Transport Layer Security (EAP-TTLS) may share a similar-sounding acronym to EAP-TLS, but it is a completely different EAP variation. EAP-TTLS goes beyond the TLS protocol, adding a tunnel to provide better security. EAP-TTLS only requires a server-side certificate. EAP-TTLS is considered to be functionally equivalent to PEAP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

IEEE 802.1X

A

The great thing is that, while 802.1X is probably encountered most often on corporate wireless networks as the preferred form of authentication and access management control, it is not a wireless standard at all and can be used in wired networks as well. This actually makes it easier for wireless and wired networks to interoperate, since they can use the same authentication methods and can connect to each other quite easily.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Remote Authentication Dial-in User Service (RADIUS) Federation

A

A federated system involves the use of a common authentication system and credentials database that multiple entities use and share. A RADIUS federation could connect those systems wirelessly using RADIUS servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Pre-shared Key(PSK) vs. Enterprise vs. Open

A

Look for a comparative question on the CompTIA Security+ exam that explores pre-shared key (PSK) vs. enterprise vs. open. This applies primarily to WPA2, not WPA3, but PSK means using personal mode, enterprise means connecting to a RADIUS server, and open means having no security at all (i.e., open season on your network).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

WiFi Protected Setup(WPS)

A

The goal of WPS is to enable anyone to join a WPS-capable device to a WPS-enabled wireless network just by pressing two buttons. Press the button on the WAP, then press the button on the device you want to join to the network; your device connects to the SSID and takes on the WAP’s WPA2 encryption. Neat!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Captive Portals

A

A captive portal is a Web page that prompts clients to enter proper credentials to gain further access to the network. This enables the organization to control or limit access to clients accessing from an acceptable location and with proper authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Site Surveys

A

In a site survey, a network tech makes a technical assessment of the area in which a wireless network will be installed and operating. Usually, the tech performs a site survey before installing the wireless network, although sometimes it might be performed periodically when looking at network performance or before expanding the wireless network to accommodate new access points or additional capacity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Heat Maps

A

A heat map is nothing more than a graphical representation of the radio-frequency (RF) sources on a site, using different colors to represent the intensity of the signal.

17
Q

WiFi Analyzers

A

A Wi-Fi analyzer tool will scan an area for existing wireless networks, providing essential information for assessing an area for potential problems or obstacles when planning an installation of a Wi-Fi network.

18
Q

Channel Overlaps

A

Excessive traffic on overlapping channels—even with separate SSIDs—can cause problems. This is sometimes referred to as adjacent-channel interference, which the CompTIA Security+ objectives shorten to channel overlaps.

19
Q

Wireless Access Point (WAP) placement

A

Wireless access point (WAP) placement matters not only in making sure that people can get a strong enough signal to access the wireless network, but also for security reasons. A WAP with a standard omnidirectional antenna located too close to an outer wall of a facility makes the wireless signal easier to pick up outside the facility, which makes it easier for bad actors to pick up the wireless signal and attempt to hack the network. Ideally, both for performance and security reasons, centralize WAP placement within a facility; in other words, place WAPs with omnidirectional antennas centrally throughout different areas of the facility so that they can adequately span all areas of coverage within a facility, without being too close to exterior walls or the roof whenever possible.

20
Q

Controller and access point security

A

No wireless network has any hope of security without serious consideration of controller and access point security. Start with the basics in a SOHO network and replace default passwords for any wireless access point to something much more secure. Also, if possible, change any factory-configured SSID passwords.