Chapter 5 Flashcards
(77 cards)
What AAA function verifies identity?
Authentication
What AAA function determines user permissions?
Authorization
What AAA function monitors resources being used and logs session statistics?
Accounting
What does an AAA server typically do when it receives an authentication request?
Challenges the user’s credentials by asking for username and password
What does the AAA server do after a user’s credentials are authenticated?
Authorizes them and decides which user profile to apply to the specific user
Describe the last process in the AAA framework
Accounts for everything the user is doing within the network and monitors resource usage and session statistics
What are two protocols used in IPsec?
ESP (encapsulating security payload)
AH (authentication header)
Which protocol transports data in a site-to-site VPN?
IPsec
How is encrypted multicast traffic carried between remote sites?
GRE (multicast) over IPsec (encryption)
What category of traffic is sent with IPsec?
Unicast traffic between two endpoints
What IPsec mode and protocol encrypt and encapsulate the entire packet?
Tunnel (encrypts) ESP (encapsulates)
What does Internet Key Exchange (IKE) do?
Handles negotiation of protocols and algorithms. Generates the encryption and authentication keys
Whats the difference between ESP tunnel and transport mode?
Tunnel protects the routing info by encrypting the IP header while transport mode only encrypts the payload and ESP trailer. Tunnel mode is used in site-to-site VPNs and transport mode is used in client-to-site VPNs.
Which security program describes badge authentication for building access?
Physical access control
Which security program describes purposely sending emails to their staff that simulates an attack?
User awareness
What formats are available to select when configuring a WLAN with a WPA2 PSK in the GUI?
ASCII, hexadecimal
What type of encryption is used for WPA2-PSK?
AES-128
What is an enhancement that was implemented with WPA3?
Forward secrecy
SAE for authentication (protection against brute force attacks)
192-bit key encryption
What encryption does WPA1 use?
TKIP
Which WPA mode uses PSK for authentication?
Personal or WPA-PSK
Which wireless security protocols use block chain cipher types?
WPA2, WPA3
What does WPA3 replace PSK with?
SAE
How many ASCII text characters can can a WPA pre-shared key contain?
8-63
How many hexadecimal characters can can a WPA pre-shared key contain?
64 minimum