3.4 Install and Configure Secure Wireless Settings Flashcards

1
Q

Wifi encryption that utilizes CCMP block cipher code

A

WPA2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Wifi encryption that utlizes GCMP block cipher mode

A

WPA3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is used to ensure data confidentiality when transmitting data via wireless connections?

A

AES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What type of check is used to verify that the data sent over a wifi connection was not altered during transport?

A

Message integrity check (MIC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the major issue with WPA2 security?

A

Pre shared key (PSK) brute force attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How has WPA3 fixed the PSK issue with WPA2?

A

Mutual authentication between device and AP

Perfect forward secrecy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What key exchange is SAE derived from?

A

Diffie-hellman

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What handshake is used in WPA3 that is commonly referred to the dragonfly handshake and involves a unique session key for each session, even if the Private key is shared?

A

Simultaneous Authentication of Equals (SAE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Method used by shared or public wifi instances that requires login via a webpage in order to access the internet.

A

Captive portal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Wifi authentication method that allows ease of setup for mobile devices, and can use different methods such as a PIN, a push button on the wireless device, or NFC

A

Wifi protected setup (WPS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a major flaw with WPS in regards to the PIN number?

A

The PIN is highly susceptible to brute force attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Base framework for wireless authentication

A

Extensible Authentication Protocol (EAP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is IEEE 802.1X frequently called?

A

Port-Based Network Access Control (NAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the 3 main components to EAP authentication over 802.1X?

A

Supplicant (the user logging in)
Authenticator
Authentication server (LDAP, RADIUS, etc.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is EAP-FAST?

A

EAP Flexible Authentication via Secure Tunneling

Uses a TLS tunnel to send authentication between supplicant and Authentication server using a PAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

EAP that uses a TLS tunnel that does not use a PAC certificate.

A

PEAP (Protected EAP)

17
Q

The most common implementation of EAP that requires certificates on all devices including the authentication server. Mutual authentication is made and then a TLS tunnel is built.

A

EAP-TLS

18
Q

EAP implementation that utilizes a TLS tunnel for authentication, but only requires a single certificate rather than certificates on all devices.

A

EAP-TTLS

19
Q

Why should you cease data transmission from you device when performing a wireless packet analysis?

A

You can’t hear if you’re talking

20
Q

What type of device is used to manage multiple APs?

A

Wireless controller