14. Wireless Security Fundamentals Flashcards

1
Q

What does MIC stand for and what does it do?

A

Message Integrity Check

MIC is calculated on the data being encrypted and it ensures that someone didn’t alter the message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the 4 categories of wireless security threats listed in the guide?

A

Rogue devices
Ad hoc networks
Client association issues
Passive or active attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a rogue client?

A

Any client that is associated to a rogue AP (an AP that is not a part of your network but can be heard by an AP on your network)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does wIPS stand for?

A

Wireless Intrusion Protection System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What algorithm does WEP use?

A

RC4 cipher algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How long are WEP keys?

A

40 or 104 bits long

represented by 10 or 26 hex digits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How is WEP used for authentication by an AP?

A

AP sends a challenge phrase which the client encrypts with the WEP key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

802.1x requires authentication before a client has access to what?

A

Wired network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does EAP stand for?

A

Extensible Authentication Protocol

It is a framework for authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

There are 3 roles in the 802.1x client authentication. What are they and who are they?

A

Supplicant - client
Authenticator - typically WLC
Authentication server (AS) - typically Radius server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

LEAP (Lightweight EAP) uses what type of encryption?

A

RC4 cipher algorithm (this is why it shouldn’t be used)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What kind of keys does LEAP use?

A

Dynamic WEP keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

EAP-FAST, PEAP, and EAP-TLS all have an inner authentication and an outer authentication that uses what kind of tunnel for protection?

A

Transport Layer Security (TLS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the differences between EAP-FAST, PEAP, and EAP-TLS in the way they do the inner authentication?

A

EAP-FAST uses PACs
PEAP uses a digital certificate from the AS but doesn’t require a certificate from the user
EAP-TLS require supplicant and AS to present digital certificates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does TKIP stand for?

A

Temporal Key Integrity Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the underlying encryption of TKIP?

A

WEP

17
Q

What does CCMP stand for?

A

Counter/CBC-MAC Protocol

18
Q

CCMP consists of what 2 algorithms?

A

AES counter mode encryption

Cipher Block Chaining Message Authentication Code (CBC-MAC) used for message integrity check

19
Q

How do you know if a device supports CCMP?

A

WPA2 designation

20
Q

Difference between WPA and WPA2

A

WPA can use either TKIP or AES(CCMP)

WPA2 only uses AES(CCMP)

21
Q

WPA and WPA2 support what two authentication modes?

A

Personal mode uses pre-shared key

Enterprise mode uses 802.1x EAP

22
Q

Cisco developed what to secure management frames?

A

Management Frame Protection (MFP)

23
Q

To use client MFP, client device must support what version of CCX and use what version of WPA

A

CCXv5

WPA2

24
Q

Wireless security is configured on a per what basis?

A

per WLAN

25
Q

What is local EAP?

A

The controller has a built in authentication server that supports LEAP, EAP-FAST, PEAP, EAP-TLS.

26
Q

What are the components of wireless security?

A

Authentication
Message privacy (encryption)
Message integrity
Intrusion protection