Compare Wireless Security Protocols Flashcards

Lesson 16B (19 cards)

1
Q
A

Configuring a TP-LINK SOHO access point with wireless encryption and authentication settings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
A

Configuring Network Policy Server to authenticate wireless clients using 802.1X EAP-TLS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Wi-Fi Protected Access (WPA)

A

improved WEP security by using RC4 encryption with Temporal Key Integrity Protocol (TKIP), which introduced key mixing, integrity checking, and rekeying to mitigate known vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Cipher Block Chaining Message Authentication Code Protocol (CCMP)

A

enhances security by providing authenticated encryption, making it more resistant to replay attacks and key recovery attempts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

WPA2

A

enhances Wi-Fi security by replacing RC4 and TKIP with AES and CCMP, providing authenticated encryption to mitigate replay attacks and key recovery vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

WPA3

A

improves Wi-Fi security by replacing WPA2’s vulnerable 4-way handshake with Simultaneous Authentication of Equals (SAE), introducing stronger cryptographic protocols like AES GCMP, encrypting management frames to prevent spoofing attacks, and protecting open network traffic with Wi-Fi Enhanced Open to prevent data sniffing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Wi-Fi authentication

A

is categorized into three types: open (no passphrase required), personal (WPA2 PSK and WPA3 SAE for secure key exchange), and enterprise (using a RADIUS server for centralized authentication). Personal authentication ensures secure access with either WPA2’s pre-shared key or WPA3’s enhanced simultaneous authentication of equals mechanism.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

WPA2-PSK authentication

A

uses a shared passphrase to generate the encryption key for network communication, with each device configuring the same secret. The passphrase is converted into a pairwise master key (PMK), which is used in WPA2’s 4-way handshake to derive session keys. However, PSK authentication is vulnerable to passphrase recovery attacks, so using at least 14 characters helps mitigate the risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

WPA3 personal authentication

A

still relies on passphrase-based group authentication but enhances security by replacing WPA2’s 4-way handshake with the Simultaneous Authentication of Equals (SAE) protocol, improving resistance to key recovery attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Enterprise authentication

A

addresses the security limitations of personal authentication by eliminating shared passphrases and allowing individual credentials. It relies on an Authentication, Authorization, and Accounting (AAA) server for credential validation, removing the need for the access point to store user credentials.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

WPA’s 802.1X enterprise authentication

A

uses Extensible Authentication Protocol (EAP) to verify users against a network directory, ensuring secure authentication data transmission via EAP over Wireless (EAPoW).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

EAP-TLS
(Extensible Authentication Protocol-Transport Layer Security)

A

It utilizes digital certificates for both the client and server, ensuring mutual authentication and a strong, encrypted connection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

EAP-TLS

A

is a highly secure multifactor authentication method that uses encryption key pairs and digital certificates for authentication. The private key is securely stored on the user’s device, requiring authentication via a PIN, password, or biometric gesture as the first factor. During an EAP session, the server and supplicant exchange digital handshakes and certificates, verifying each other’s authenticity as the second factor before granting access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

AAA server

A

is a network server that provides Authentication, Authorization, and Accounting (AAA) services for network access control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

RADIUS
(Remote Authentication Dial-In User Service)

A

enables secure enterprise authentication by allowing wireless access points to act as clients that forward user credentials to a central AAA server without storing or reading them, ensuring mutual trust through a shared secret.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

wireless access point (WAP)

A

It acts as a bridge between wireless devices and a wired network, like a router, but its primary function is to extend the reach of a Wi-Fi network.

17
Q

TACACS+
Terminal Access Controller Access Control System Plus (TACACS+)

A

is another way of implementing AAA. TACACS+ was developed by Cisco but is also supported
on many third-party implementations.

Where RADIUS is often used to authenticate
connections by wireless and VPN users, TACACS+ is often used in authenticating administrative access to routers, switches, and access points.

18
Q

Kerberos

A

enables single sign-on (SSO) by issuing authorization tickets for network authentication, though access points rely on RADIUS or TACACS+ with EAP to securely tunnel credentials for domain user authentication.