Ch 8 Key Terms Flashcards
secure tunnels client password authentication within TLS records
EAP-TTLS
CCMP
EAP-TLS
WEP-SHA1
EAP-TTLS
a centrally located WLAN connection device that can send and receive information
AP
WPA
WLAN
WPS
AP
designed to help users who have little or no knowledge of security to quickly and easily implement security on their WLANs
WAP
WPA
WPS
WLAN
WPS
sends unsolicited messages to Bluetooth-enabled devices
Bluesmurfing
Blueponic
Bluejacking
Bluesnarfing
Bluejacking
an AP setup by the attacker; designed to mimic an authorized AP, so a user’s mobile device will unknowingly connect to this evil twin AP
evil twin
de-authentication
disassociation attack
rogue AP
evil twin
Wi-Fi Protected Access addresses both encryption and authentication; designed goal was to fit into existing WEP engine
WPS
WEP-SHA1
EAP
WPA
WPA
have the intelligence required to manage wireless authentication, encryption, and other functions for the wireless client device that they serve
WPS
AP
EAP-TLS
EAP-TTLS
AP
uses digital certificates for authentication
EAP-TLS
EAP-TTLS
WAP
WEP
EAP-TLS
authentication for the WPA2 Enterprise model; implements port-based authentication
IEEE 802.x1
IEEE 802.1q
IEEE 802.x
IEEE 802.1x
IEEE 802.1x
extraneous RF signal noise that creates interference and prevents communications from occurring
rogue AP
EMI
jamming
CCMP
jamming
a set of standards used to establish communication between devices in very close proximity
WPA
AP
RFID
NFC
NFC
designed to simplify the deployment of 802.1x by using MS Windows logins and passwords; creates an encrypted channel between the client and the authentication server, and the channel then protects the subsequent user authentication exchange
WPS
WAP
EAP
PEAP
PEAP
authentication for WPA Personal
PEAP
PSK
EAP
TKIP
PSK
functions as a wrapper around WEP by adding an additional layer of security but preserving WEP’s basic functionality
EAP
TKIP
PSA
WEP-SHA1
TKIP
encryption protocol used for WPA2; specifies the use of CCM with AES
TKIP
PSA
WPA
CCMP
CCMP