4.2 Explain Authentication and Access Controls Flashcards

1
Q

WPA

A
  • WPA is considered exploitable and is no longer used for wireless security. A common exploit used against WPA is an attack on the helper protocol of Wi-Fi Protected Setup (WPS).
  • WPA uses 256-bit keys
  • operates in two modes of preshared key (PSK),
  • PSK is the most common, because it can easily be implemented.
  • Enterprise mode requires a certificate server infrastructure and is also called WPA-802.1x. Enterprise mode uses the 802.1x protocol, RADIUS, and EAP; it is often used in corporate environments.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

WPA2

A
  • 802.11i
    Uses personal and enterprise mode
  • Uses AES. AES is more secure than RC4 plus TKIP.
  • Also exploitable if WPS service is enabled (WPS needs to be off).
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Kerberos

A
  • Secure authentication protocol.
  • 3DES Triple data encryption AND AES (Advanced Encryption Standard).
  • Main authentication protocol for Windows Active Directory.
  • Three-way trust to authenticate users and machines.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

LDAP

A

LIghtweight Directory Access Protocol.

Open standard directory service protocol.

Uses client-server protocl for looking up objects in a directory service and their respective attributes.

  • LDAP adopted by microsoft for AD lookups of objects and domain controllers.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Certificates

A

Use of public key infrastructure (PKI) to validate users, computers, and applications. Even works on some IOT devices.
Remember diagram.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly