6.6 Flashcards

1
Q

The authentication process can be so much strengthened with – – – – which prevents the AP from authenticating anyways who is Mac address is not listed by the network administrator

A

Max filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Scramble data transmitted over the airwaves into a format that cannot easily be interpreted is the signal is intercepted

A

Encryption algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

For some measure of security 802.11 allows for optional encryption using Wep Offered in two forms of oil syndication

A

Open system authentication or shared key authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

No key is used at all. The wireless access client knowing only the access points SSID, request authentication. The access point generates a single use code for that session only in the computer exceptional code

A

OSA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

All wireless access coins use the same key which A key used to encrypt transmissions

A

Shared key authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

 RC for Riverset cipher four Is now a – – – –encryption that is still widely used

A

Insecure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

This improves wireless security for newer devices that can use WPA two acronyms with an acronyms are the only the beginning of what makes this protocol so interesting

A

CCMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

 This is an open source as an occasion and authorization service

A

Radius

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

This differs from other authentication protocols and that it only provides a framework for authenticated clients and servers it is not perform encryption authentication on its own instead it works with other encryption an authentication schemes to verify the credentials of users and devices

A

Extensible authentication protocol EAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

This protocol create an encrypted Telus tunnel between the supplicant in the server before proceeding with its usual EAP process

A

PEAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Also a form of tunnel EAP this technology What is the valve by Cisco and works similarly to PIP except faster. The most important difference with – – – – – – Is that it uses protected access credentials which are so much similar to cookies that website store on users computer to track their activities

A

EAP fast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

This more sophisticated security check me to text a Wi-Fi clients geographical position and activate resources to access according to that location

A

Geo fencing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

When establishments in homeowners for that matter create an isolated – – – – – – – Through their Wi-Fi router access point this – – – – – as a separate SS ID and pass phrase and can be managed with different rules or time restrictions

A

Guest network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

This technique is similar to a guest network but similar – – – – – – – allows a wireless client onto the net work but imposes firewall rules to restrict the clients ability to communicate with only the default gateway not other devices on the net work

A

Wireless client isolation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

If you do you provide a guest at work either at home or at a business be sure to set up a – – – – – . This is the first page a new client she’s in the browser when connecting to the guest network and it usually requires the use of to agree to set of terms and conditions before canning for the access to the guest Netwerk

A

Captive portal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly