CH12 Wireless Networking Flashcards

1
Q

WEP uses how ___bits and __algorithm

A

40-128, RC4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

802.11X is ___

A

Remote authentication dial-in user service(RADIUS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what does RADIUS provide?

A

authorization, centralized access, and accounting supervision(AAA).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

802.11i is what?

A

Temporal key integrity protocol(TKIP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

WPA is used with what?

A

TKIP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

WPA2 is used with what?

A

AES and CCMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Extensible Authentication protocol-transport layer security(EAP-TLS) requires a ___

A

PKI(public key infrastructure)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what is PKI?

A

A system that links users to public keys and verifies a user’s identity by using a certificate authority(CA).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

AN entire security system that establishes a user’s identity when the first log on to a system is ____

A

Kerberos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

AAAA & AAA is used with___ & ____

A

TACACS+, and RADIUS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

___ is an authentication and accounting service that’s used for verifying users over various types of links

A

RADIUS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

True or false TACACS+ uses TCP

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

True or false RADIUS uses UDP

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What separates user authentication and authorization into two profiles?

A

TACACS+

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

True or False TACACS+ is compatible with TACACS

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

___ combines phone network with IP data traffic and video traffic

A

Unified Voice Services.

It takes voice and video information and encapsulates it within IP packets to be transmitted on the data network.

17
Q

Network controllers are referred to a____

A

NIC

18
Q

___ is a method of securing network hosts before they are allowed to access a network

A

Network Access Controllers(NAC)

19
Q

NACs are commonly found with___ _____& the most common form of a NAC is used with IEE____

A

Wireless networking, 802.1x

20
Q

An encryption protocol that is more secure then PAP

A

CHAP

21
Q

CHAP uses what hash

A

MD5

22
Q

CHAP uses what to verify the identity of a peer?

A

Three way handshake

23
Q

What is MS-CHAP

A

Microsoft’s version of CHAP

24
Q

Extensible Authentication Protocol(EAP) is?

A

An extension of PPP that provides a host of additional authentication methods for remote-access clients.

25
Q

Some examples of EAP include

A

Smart cards, certificates, Kerberos, bio-metric scanners.

26
Q

How does MD5 hash work?

A

Created from a clear text and then sent along with the clear text message. At the other end a second hash of clear text data is created. If the two hashes match data is deemed unchanged.

27
Q

MD5 hash value is __bits

A

128

28
Q

SHA-1 is __bit digest

A

160

29
Q

SHA-2 uses ___bit digest

A

512

30
Q

A count of the number of bits in a transmission unit that is included with the unit so that the receiver can see if the same number of bits arrived is known as a _____

A

Checksum

31
Q

True or false TCP and UDP both provide a checksum count and verification

A

True

32
Q

IPSec does what to IP packets?

A

Protects, encrypts, and provides data integrity to individual packets.

33
Q

IPSec is usually used with____ VPNs

A

Site to site VPNs

34
Q

RAS server is what? and what can it do?

A

A combination of dial-up and VPN servers that can accept multiple client connections. It can also terminate client VPN tunnels and route client traffic into the private network.