NIS Chapter 07 Flashcards

1
Q

PSK is intended to be used in SOHO environments, why is this?

A

because PSK does not require the extensive infrastructure and configurations associated with stronger 802.1X

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does the 802.11-12 define?

A

It defines authentication and key management either by PSK or 802.1X/EAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the difference and similarity between WPA and WPA2

A

WPA uses TKIP/RC4 encryption and WPA2-Personal uses CCMP/AES.

Similarity: both use PSK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What were the 2 goals of WPA-Personal?

A
  • To stop the use of fixed sized keys
  • to stop the need for complicated HEX and ASCII input
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How does WPA-Personal accomplish its goals?

A

By allowing a user to enter a passphrase between 8-63 characters that will then be mapped to a PSK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a PSK?

A

This is a 256 bit length / 64 character static key that is configured on the client and the AP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the formula to compute the PSK?

A

PSK = PBKDF2(PassPhrase, ssid, ssidLength, 4096, 256)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is key stretching?

A

The added computational work to
make password cracking much more difficult, and is known as key stretching

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Why is it such a big threat to have a weak SSID and a weak passphrase?

A

Because the SSID and the passphrase are both used in the computation of the PS which is also used as the PMK as seeding material for the 4way handshake which is used to generate dynamic encryption keys between the clients. And every client station has the same PMK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How is the PTK created?

A

4-Way Handshake uses a pseudo-random function to combine the PMK with the ANonce,
SNonce, AA, and SPA to create a pairwise transient key (PTK).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the vulnerability found in the 4 way handshake?

A

ANonce, SNonce, and the MAC addresses of the client station and the access point are
all seen in clear text during the 4-Way Handshake frame exchange.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What risk does this impose?

A

if the hacker derives the PMK from the passphrase all they need to do is to listen in on the 4-way handshake and they have all they need to make a PTK and the decrypt any unicast traffic between the client and AP. In this way both encryption keys and network resources are at risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the easier way to obtain the passphrase?

A

through social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is entropy?

A

this is the measure pf incertainty associated with a random variable and detemines how diffulcult a password is to crack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How many bits of entropy are need to be considered sade?

A

96

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How do you increase entrpoy?

A

mixing lower, upper and numbers and special characters

17
Q

What is a solution to disallow the single passphrase between all clients issue?

A
  • each computing devices had a unique PSK and a DB is kept to manage the pw and the usernames. They can either be generated dynamically or created and can have an expiration date.
18
Q

Explain PSK authentication

A

PSK authentication is meant to be used in SOHO
environments because the stronger enterprise 802.1X authentication solutions are not
available. PSK authentication is also known by the more common name of WPA - Personal
or WPA2 - Personal.

19
Q

Define entropy and how it relates to PSK authentication

A

Passwords or passphrases by
themselves have an entropy value of zero. Entropy is a measure of uncertainty associated
with a random variable. The method you use to select a passphrase can be measured in
terms of randomness.

20
Q

Explain the advantages of proprietary PSK solutions

A

Proprietary PSK solutions prevent
social engineering and employee sharing of a passphrase. Proprietary PSK solutions greatly
limit the ability of malicious users to decrypt user traffi c and simplify administration.

21
Q
A