4.2 + 4.3 authentication/wireless security Flashcards

1
Q

WPA

A

Uses TKIP and RC4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

WPA2

A

AES

CCMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

AES

CCMP

A

WPA2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

TKIP-RC4

A

WPA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

CCMP-AES

A

WPA2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

ACLs are usually defined on the ___ or the ___ of an interface.

A

ingress

egress

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

ACLs are usually defined on the ___ or the ___ of an interface.

A

ingress

egress

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is EAP?

A

Extensible autheneticaiton protocol.

Authentication framework used for 802.1X, WPA, WPA2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

TKIP

A

Integrity check
adds sequence counter, prevents replay attacks
replaced by CCMP
WPA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Integrity check
adds sequence counter, prevents replay attacks
deprecated standard

A

TKIP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

RC4

A

Encryption algorithm

Replaced by AES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

CCMP

A

encryption standard that replaced TKIP

used for WPA2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

AES

A

replaced RC4

used for WPA2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

AES

A

replaced RC4

used for WPA2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

EAP-FAST

A

EAP Flexible Authentication via Secure Tunneling.

Lightweight authentication method

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

EAP-TLS

A

EAP Transport Layer Security.

Very wide adoption

17
Q

EAP-TTLS

A

EAP Tunneled TLS

Supports other/older authentication protocols by using a TLS tunnel

18
Q

PEAP

A

Protected Extensible Authentication Protocol
RSA
Encapsulates EAP in a TLS tunnel
Commonly implemented as PEAPv0/MSCHAPv2

19
Q

MSCHAPv2

A

A database PEAP authenticates to, stores certificates.

20
Q

WPA2-PSK / WPA2-Personal

A

Preshared key, chaning the key requires reconfiguration of all devices on the network.

21
Q

WPA2-Enterprise / WPA2-802.1X

A

Authenticates users individually using using username/password with AAA/RADIUS server, no key.

22
Q

Geofencing

A

Using GPS on mobile devices via a MDM to prohibit or allow access to a network based on location. Sometimes used for cameras, disabling them while inside building.

23
Q

Define Authorization

A

Level of access granted based on ID and authentication.

24
Q

Define Authentication

A

Validation of presented idenfitication.

25
Q

Definite Accounting

A

evidence, login times, data sent/recieved, etc

26
Q

Kerberos

A

Mutual authentication protocol used for SSO

27
Q

What SSO related technology can prevent MiTM attacks and replay attacks?

A

Kerberos

28
Q

When is local authentication useful?

A

When a AAA server is down/unavailabe.

29
Q

Name 4 examples of certificate based authentication

A

Smart Card
CAC
PIV
802.1X

30
Q

SIEM does what

A

Monitors/prevents unauthorized access to networks