2.2: Wireless Security Flashcards
1
Q
- (2.2)
Which wireless authentication method is a common AAA protocol, centralises authentication for users and is available on almost any server operating system?
a. TACACS+
b. Kerberos
c. RADIUS
d. MFA
A
c. RADIUS
2
Q
- (2.2)
Which wireless protocol uses GCMP encryption and MIC (message integrity check) with GMAC?
a. TKIP
b. WPA2
c. AES
d. WPA3
A
d. WPA3
3
Q
- (2.2)
Which wireless authentication method is a remote authentication protocol relating to Cisco devices?
a. TACACS+
b. Kerberos
c. RADIUS
d. MFA
A
a. TACACS+
4
Q
- (2.2)
Which wireless protocol uses CCMP block cipher mode and MIC (Message Integrity Check) with CBC-MAC?
a. TKIP
b. WPA2
c. AES
d. WPA3
A
b. WPA2
5
Q
- (2.2)
Which wireless authentication method enables SSO for Windows?
a. TACACS+
b. Kerberos
c. RADIUS
d. MFA
A
b. Kerberos
6
Q
- (2.2)
Which wireless protocol uses SAE (Simultaneous Authentication of Equals) / the dragonfly handshake?
a. TKIP
b. WPA2
c. AES
d. WPA3
A
d. WPA3
7
Q
- (2.2)
Which wireless protocol uses a four way handshake and is vulnerable to brute force attacks?
a. TKIP
b. WPA2
c. AES
d. WPA3
A
b. WPA2