CH12 Wireless Networking Flashcards

(34 cards)

1
Q

WEP uses how ___bits and __algorithm

A

40-128, RC4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

802.11X is ___

A

Remote authentication dial-in user service(RADIUS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what does RADIUS provide?

A

authorization, centralized access, and accounting supervision(AAA).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

802.11i is what?

A

Temporal key integrity protocol(TKIP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

WPA is used with what?

A

TKIP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

WPA2 is used with what?

A

AES and CCMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Extensible Authentication protocol-transport layer security(EAP-TLS) requires a ___

A

PKI(public key infrastructure)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what is PKI?

A

A system that links users to public keys and verifies a user’s identity by using a certificate authority(CA).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

AN entire security system that establishes a user’s identity when the first log on to a system is ____

A

Kerberos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

AAAA & AAA is used with___ & ____

A

TACACS+, and RADIUS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

___ is an authentication and accounting service that’s used for verifying users over various types of links

A

RADIUS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

True or false TACACS+ uses TCP

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

True or false RADIUS uses UDP

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What separates user authentication and authorization into two profiles?

A

TACACS+

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

True or False TACACS+ is compatible with TACACS

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

___ combines phone network with IP data traffic and video traffic

A

Unified Voice Services.

It takes voice and video information and encapsulates it within IP packets to be transmitted on the data network.

17
Q

Network controllers are referred to a____

18
Q

___ is a method of securing network hosts before they are allowed to access a network

A

Network Access Controllers(NAC)

19
Q

NACs are commonly found with___ _____& the most common form of a NAC is used with IEE____

A

Wireless networking, 802.1x

20
Q

An encryption protocol that is more secure then PAP

21
Q

CHAP uses what hash

22
Q

CHAP uses what to verify the identity of a peer?

A

Three way handshake

23
Q

What is MS-CHAP

A

Microsoft’s version of CHAP

24
Q

Extensible Authentication Protocol(EAP) is?

A

An extension of PPP that provides a host of additional authentication methods for remote-access clients.

25
Some examples of EAP include
Smart cards, certificates, Kerberos, bio-metric scanners.
26
How does MD5 hash work?
Created from a clear text and then sent along with the clear text message. At the other end a second hash of clear text data is created. If the two hashes match data is deemed unchanged.
27
MD5 hash value is __bits
128
28
SHA-1 is __bit digest
160
29
SHA-2 uses ___bit digest
512
30
A count of the number of bits in a transmission unit that is included with the unit so that the receiver can see if the same number of bits arrived is known as a _____
Checksum
31
True or false TCP and UDP both provide a checksum count and verification
True
32
IPSec does what to IP packets?
Protects, encrypts, and provides data integrity to individual packets.
33
IPSec is usually used with____ VPNs
Site to site VPNs
34
RAS server is what? and what can it do?
A combination of dial-up and VPN servers that can accept multiple client connections. It can also terminate client VPN tunnels and route client traffic into the private network.