14 - Wireless Security Flashcards
Name the described Wi-Fi security protocol.
Brief description: Ensure wired-like privacy in wireless
Encryption: RC4
Data Integrity: CRC-32
Key Management: None
WEP
Name the described Wi-Fi security protocol.
Brief description: Based on 802.11i without requirement for new hardware
Encryption: TKIP + RC4
Data Integrity: MIC algorithm
Key Management: 4-way handshake
WPA
Name the described Wi-Fi security protocol.
Brief description: All mandatory 802.11i features and a new hardware
Encryption: CCMP/AES
Data Integrity: Cipher Block Chaining Message Authentication Code (based on AES)
Key Management: 4-way handshake
WPA2
Name the described Wi-Fi security protocol.
Brief description: Announced by Wi-Fi Alliance
Encryption: GCMP-256
Data Integrity: BIP-GMAC-256
Key Management: ECDH and ECDSA
WPA3
What does BIP-GMAC-256 stand for?
256-bit Broadcast/Multicast Integrity Protocol Galois Message Authentication Code
What does ECDH stand for?
Elliptic Curve Diffie-Hellman
What does ECDSA stand for?
Elliptic Curve Digital Signature Algorithm
___ is a symmetric encryption algorithm that uses the now antiquated DES algorithm three times in a row to encrypt your data.
triple data encryption standard (3DES)
The ___ standard is a symmetric key algorithm. Is considered a very secure form of encryption today.
Advanced Encryption Standard (AES)
What does WEP stand for?
wired equivalent privacy
What does WPA stand for?
Wi-Fi protected access
What does IEEE stand for?
Institute of Electrical and Electronics Engineers
Which IEEE 802 standard is for wireless LAN connections?
a) 802.11
b) 802.1x
c) 802.3
d) 802.15
a) 802.11
What is one disadvantage of using WPA3 on a wireless network?
a) Transmission rates are higher using WPA2
b) WPA3 may not be supported by many older networks
c) Security levels are higher using WEP
d) The licensing fees can be costly on large networks
b) WPA3 may not be supported by many older networks
Why would someone choose to implement AES encryption over 3DES encryption?
a) To hide the network name form discovery protocols
b) Because they prefer to use a symmetric key algorithm
c) For a more secure level of encryption due to increased complexity
d) For transmission over long distances
c) For a more secure level of encryption due to increased complexity